Advisory Published
Updated

CVE-2021-47153: i2c: i801: Don't generate an interrupt on bus reset

First published: Mon Mar 25 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset Now that the i2c-i801 driver supports interrupts, setting the KILL bit in a attempt to recover from a timed out transaction triggers an interrupt. Unfortunately, the interrupt handler (i801_isr) is not prepared for this situation and will try to process the interrupt as if it was signaling the end of a successful transaction. In the case of a block transaction, this can result in an out-of-range memory access. This condition was reproduced several times by syzbot: https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79 So disable interrupts while trying to reset the bus. Interrupts will be enabled again for the following transaction.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<4.4.271
4.4.271
redhat/kernel<4.9.271
4.9.271
redhat/kernel<4.14.235
4.14.235
redhat/kernel<4.19.193
4.19.193
redhat/kernel<5.4.124
5.4.124
redhat/kernel<5.10.42
5.10.42
redhat/kernel<5.12.9
5.12.9
redhat/kernel<5.13
5.13
IBM Security Verify Governance - Identity Manager<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Software Stack<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Virtual Appliance<=ISVG 10.0.2
IBM Security Verify Governance Identity Manager Container<=ISVG 10.0.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2021-47153?

    CVE-2021-47153 has a moderate severity due to the risk of interrupt generation on bus reset, potentially leading to system instability.

  • How do I fix CVE-2021-47153?

    To fix CVE-2021-47153, upgrade the Linux kernel to one of the patched versions, such as 4.4.271, 4.9.271, 4.14.235, 4.19.193, 5.4.124, 5.10.42, 5.12.9, or 5.13.

  • Which versions of the Linux kernel are affected by CVE-2021-47153?

    Affected versions include all Linux kernel versions prior to 4.4.271, 4.9.271, 4.14.235, 4.19.193, 5.4.124, 5.10.42, 5.12.9, and 5.13.

  • Is CVE-2021-47153 specific to certain Linux distributions?

    Yes, CVE-2021-47153 primarily affects Red Hat-based distributions due to the vulnerability in the i2c-i801 driver.

  • What could happen if CVE-2021-47153 is exploited?

    Exploitation of CVE-2021-47153 could result in unpredictable system behavior and potential crashes due to improper interrupt handling.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203