Bug 2266408 (CVE-2021-46909)

Summary: CVE-2021-46909 kernel: PCI interrupt mapping cause oops
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: acaringi, allarkin, aquini, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, drow, dvlasenk, esandeen, ezulian, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mleitner, mmilgram, mstowell, mstowe, nmurray, ptalbert, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, sidakwo, sukulkar, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the ARM footbridge in the Linux Kernel. This issue may cause an oops if a PCI driver is loaded or bound after the kernel has initialized.
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-02-27 20:58:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2266412    
Bug Blocks: 2266369    

Description Rohit Keshri 2024-02-27 18:55:31 UTC
In the Linux kernel, the following vulnerability has been resolved:

ARM: footbridge: fix PCI interrupt mapping

Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in
pci_device_probe()"), the PCI code will call the IRQ mapping function
whenever a PCI driver is probed. If these are marked as __init, this
causes an oops if a PCI driver is loaded or bound after the kernel has
initialised.

https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a
https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a
https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7
https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf
https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b
https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d

Comment 1 Rohit Keshri 2024-02-27 18:57:59 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2266412]

Comment 4 Justin M. Forbes 2024-02-27 23:10:24 UTC
This was fixed for Fedora with the 5.11.16 stable kernel updates.