6.5

CVE-2024-36916

In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: avoid out of bounds shift

UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg->delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.

[  186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
 <IRQ>
 dump_stack_lvl+0x8f/0xe0
 __ubsan_handle_shift_out_of_bounds+0x22c/0x280
 iocg_kick_delay+0x30b/0x310
 ioc_timer_fn+0x2fb/0x1f80
 __run_timer_base+0x1b6/0x250
...

Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.

I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 62accf6c1d7b433752cb3591bba8967b7a801ad5
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
Version < 844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
Version < f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
Version < ce0e99cae00e3131872936713b7f55eefd53ab86
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
Version < 488dc6808cb8369685f18cee81e88e7052ac153b
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
Version < beaa51b36012fad5a4d3c18b88a617aea7a9b96d
Version 5160a5a53c0c4ae3708959d9465ea43ad5d90542
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.10
Status affected
Version < 5.10
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.217
Status unaffected
Version <= 5.15.*
Version 5.15.159
Status unaffected
Version <= 6.1.*
Version 6.1.91
Status unaffected
Version <= 6.6.*
Version 6.6.31
Status unaffected
Version <= 6.8.*
Version 6.8.10
Status unaffected
Version <= *
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.348
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 3.9 2.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L