Improper Check for Unusual or Exceptional Conditions Affecting kernel-tools package, versions <0:4.18.0-553.8.1.el8_10
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ROCKY8-KERNELTOOLS-7453243
- published 16 Jul 2024
- disclosed 27 Feb 2024
Introduced: 27 Feb 2024
CVE-2021-46909 Open this link in a new tabHow to fix?
Upgrade Rocky-Linux:8
kernel-tools
to version 0:4.18.0-553.8.1.el8_10 or higher.
This issue was patched in RLSA-2024:4211
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-tools
package and not the kernel-tools
package as distributed by Rocky-Linux
.
See How to fix?
for Rocky-Linux:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
ARM: footbridge: fix PCI interrupt mapping
Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in pci_device_probe()"), the PCI code will call the IRQ mapping function whenever a PCI driver is probed. If these are marked as __init, this causes an oops if a PCI driver is loaded or bound after the kernel has initialised.
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909
- https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a
- https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a
- https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7
- https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf
- https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b
- https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d