First published: Mon Mar 25 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset Now that the i2c-i801 driver supports interrupts, setting the KILL bit in a attempt to recover from a timed out transaction triggers an interrupt. Unfortunately, the interrupt handler (i801_isr) is not prepared for this situation and will try to process the interrupt as if it was signaling the end of a successful transaction. In the case of a block transaction, this can result in an out-of-range memory access. This condition was reproduced several times by syzbot: https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79 So disable interrupts while trying to reset the bus. Interrupts will be enabled again for the following transaction.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.4.271 | 4.4.271 |
redhat/kernel | <4.9.271 | 4.9.271 |
redhat/kernel | <4.14.235 | 4.14.235 |
redhat/kernel | <4.19.193 | 4.19.193 |
redhat/kernel | <5.4.124 | 5.4.124 |
redhat/kernel | <5.10.42 | 5.10.42 |
redhat/kernel | <5.12.9 | 5.12.9 |
redhat/kernel | <5.13 | 5.13 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47153 has a moderate severity due to the risk of interrupt generation on bus reset, potentially leading to system instability.
To fix CVE-2021-47153, upgrade the Linux kernel to one of the patched versions, such as 4.4.271, 4.9.271, 4.14.235, 4.19.193, 5.4.124, 5.10.42, 5.12.9, or 5.13.
Affected versions include all Linux kernel versions prior to 4.4.271, 4.9.271, 4.14.235, 4.19.193, 5.4.124, 5.10.42, 5.12.9, and 5.13.
Yes, CVE-2021-47153 primarily affects Red Hat-based distributions due to the vulnerability in the i2c-i801 driver.
Exploitation of CVE-2021-47153 could result in unpredictable system behavior and potential crashes due to improper interrupt handling.