{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:35:17.811","vulnerabilities":[{"cve":{"id":"CVE-2021-46914","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-02-27T07:15:07.920","lastModified":"2024-11-21T06:34:55.293","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: fix unbalanced device enable/disable in suspend/resume\n\npci_disable_device() called in __ixgbe_shutdown() decreases\ndev->enable_cnt by 1. pci_enable_device_mem() which increases\ndev->enable_cnt by 1, was removed from ixgbe_resume() in commit\n6f82b2558735 (\"ixgbe: use generic power management\"). This caused\nunbalanced increase/decrease. So add pci_enable_device_mem() back.\n\nFix the following call trace.\n\n  ixgbe 0000:17:00.1: disabling already-disabled device\n  Call Trace:\n   __ixgbe_shutdown+0x10a/0x1e0 [ixgbe]\n   ixgbe_suspend+0x32/0x70 [ixgbe]\n   pci_pm_suspend+0x87/0x160\n   ? pci_pm_freeze+0xd0/0xd0\n   dpm_run_callback+0x42/0x170\n   __device_suspend+0x114/0x460\n   async_suspend+0x1f/0xa0\n   async_run_entry_fn+0x3c/0xf0\n   process_one_work+0x1dd/0x410\n   worker_thread+0x34/0x3f0\n   ? cancel_delayed_work+0x90/0x90\n   kthread+0x14c/0x170\n   ? kthread_park+0x90/0x90\n   ret_from_fork+0x1f/0x30"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ixgbe: arreglar dispositivo desequilibrado habilitar/deshabilitar en suspensión/reanudación pci_disable_device() llamado en __ixgbe_shutdown() disminuye dev-&gt;enable_cnt en 1. pci_enable_device_mem() que aumenta dev-&gt;enable_cnt en 1 1, se eliminó de ixgbe_resume() en el commit 6f82b2558735 (\"ixgbe: usar administración de energía genérica\"). Esto provocó un aumento/disminución desequilibrado. Así que vuelva a agregar pci_enable_device_mem(). Corrija el siguiente rastreo de llamadas. ixgbe 0000:17:00.1: deshabilitar el seguimiento de llamadas del dispositivo ya deshabilitado: __ixgbe_shutdown+0x10a/0x1e0 [ixgbe] ixgbe_suspend+0x32/0x70 [ixgbe] pci_pm_suspend+0x87/0x160 ? pci_pm_freeze+0xd0/0xd0 dpm_run_callback+0x42/0x170 __device_suspend+0x114/0x460 async_suspend+0x1f/0xa0 async_run_entry_fn+0x3c/0xf0 Process_one_work+0x1dd/0x410 Workers_thread+0x34/0x3f0 ? cancel_delayed_work+0x90/0x90 kthread+0x14c/0x170 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9.0","versionEndExcluding":"5.10.32","matchCriteriaId":"E3DE1907-1009-48E0-B696-42F5B1135524"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11.0","versionEndExcluding":"5.11.16","matchCriteriaId":"3C5242B9-B5BD-4578-AD66-69DF59D54A14"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}