CVE-2021-47153
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
25/03/2024
Last modified:
16/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
i2c: i801: Don&#39;t generate an interrupt on bus reset<br />
<br />
Now that the i2c-i801 driver supports interrupts, setting the KILL bit<br />
in a attempt to recover from a timed out transaction triggers an<br />
interrupt. Unfortunately, the interrupt handler (i801_isr) is not<br />
prepared for this situation and will try to process the interrupt as<br />
if it was signaling the end of a successful transaction. In the case<br />
of a block transaction, this can result in an out-of-range memory<br />
access.<br />
<br />
This condition was reproduced several times by syzbot:<br />
https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e<br />
https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e<br />
https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e<br />
https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb<br />
https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a<br />
https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79<br />
<br />
So disable interrupts while trying to reset the bus. Interrupts will<br />
be enabled again for the following transaction.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.6 (including) | 4.4.271 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 4.9.271 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.193 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.124 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b
- https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3
- https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a
- https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef
- https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c
- https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6
- https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b
- https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629
- https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b
- https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3
- https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a
- https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef
- https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c
- https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6
- https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b
- https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629



