First published: Tue Feb 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ARM: footbridge: fix PCI interrupt mapping Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in pci_device_probe()"), the PCI code will call the IRQ mapping function whenever a PCI driver is probed. If these are marked as __init, this causes an oops if a PCI driver is loaded or bound after the kernel has initialised.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=4.13.0<4.14.232 | |
Linux kernel | >=4.15.0<4.19.189 | |
Linux kernel | >=4.20.0<5.4.114 | |
Linux kernel | >=5.5.0<5.10.32 | |
Linux kernel | >=5.11.0<5.11.16 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46909 has been classified with medium severity due to the potential impacts on system performance and stability.
To resolve CVE-2021-46909, upgrade your Linux kernel to a version above the specified vulnerable ranges.
CVE-2021-46909 affects Linux kernel versions between 4.13.0 and 4.14.232, 4.15.0 and 4.19.189, 4.20.0 and 5.4.114, 5.5.0 and 5.10.32, and 5.11.0 and 5.11.16.
CVE-2021-46909 addresses a problem with PCI interrupt mapping within the Linux kernel affecting the ARM architecture.
While CVE-2021-46909 primarily impacts system performance, it may expose systems to denial-of-service risks under certain conditions.