In the Linux kernel, the following vulnerability has been resolved:
ARM: footbridge: fix PCI interrupt mapping
Since commit 30fdfb929e82 ("PCI: Add a call to pciassignirq() in pcideviceprobe()"), the PCI code will call the IRQ mapping function whenever a PCI driver is probed. If these are marked as __init, this causes an oops if a PCI driver is loaded or bound after the kernel has initialised.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46909.json"
[
{
"events": [
{
"introduced": "4.13.0"
},
{
"fixed": "4.14.232"
}
]
},
{
"events": [
{
"introduced": "4.15.0"
},
{
"fixed": "4.19.189"
}
]
},
{
"events": [
{
"introduced": "4.20.0"
},
{
"fixed": "5.4.114"
}
]
},
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.10.32"
}
]
},
{
"events": [
{
"introduced": "5.11.0"
},
{
"fixed": "5.11.16"
}
]
}
]