Bug 2266408 (CVE-2021-46909) - CVE-2021-46909 kernel: PCI interrupt mapping cause oops
Summary: CVE-2021-46909 kernel: PCI interrupt mapping cause oops
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-46909
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2266412
Blocks: 2266369
TreeView+ depends on / blocked
 
Reported: 2024-02-27 18:55 UTC by Rohit Keshri
Modified: 2024-03-26 18:34 UTC (History)
51 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A denial of service flaw was found in the ARM footbridge in the Linux Kernel. This issue may cause an oops if a PCI driver is loaded or bound after the kernel has initialized.
Clone Of:
Environment:
Last Closed: 2024-02-27 20:58:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-02-27 18:55:31 UTC
In the Linux kernel, the following vulnerability has been resolved:

ARM: footbridge: fix PCI interrupt mapping

Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in
pci_device_probe()"), the PCI code will call the IRQ mapping function
whenever a PCI driver is probed. If these are marked as __init, this
causes an oops if a PCI driver is loaded or bound after the kernel has
initialised.

https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a
https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a
https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7
https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf
https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b
https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d

Comment 1 Rohit Keshri 2024-02-27 18:57:59 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2266412]

Comment 4 Justin M. Forbes 2024-02-27 23:10:24 UTC
This was fixed for Fedora with the 5.11.16 stable kernel updates.


Note You need to log in before you can comment on or make changes to this bug.