Skip to main content

CVE-2021-47153: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2021-47153cvecve-2021-47153
Published: Mon Mar 25 2024 (03/25/2024, 09:07:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: i801: Don't generate an interrupt on bus reset Now that the i2c-i801 driver supports interrupts, setting the KILL bit in a attempt to recover from a timed out transaction triggers an interrupt. Unfortunately, the interrupt handler (i801_isr) is not prepared for this situation and will try to process the interrupt as if it was signaling the end of a successful transaction. In the case of a block transaction, this can result in an out-of-range memory access. This condition was reproduced several times by syzbot: https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79 So disable interrupts while trying to reset the bus. Interrupts will be enabled again for the following transaction.

AI-Powered Analysis

AILast updated: 06/26/2025, 19:20:19 UTC

Technical Analysis

CVE-2021-47153 is a vulnerability in the Linux kernel specifically affecting the i2c-i801 driver, which manages I2C bus communications on Intel hardware. The issue arises because the driver, after adding interrupt support, improperly handles interrupts triggered during a bus reset operation. When the driver attempts to recover from a timed-out transaction by setting the KILL bit, it inadvertently causes an interrupt. The interrupt handler (i801_isr) is not designed to handle interrupts generated in this context and mistakenly processes them as if they indicate the successful completion of a transaction. This misinterpretation can lead to an out-of-range memory access during block transactions, potentially causing kernel crashes or denial of service. The vulnerability was identified and reproduced multiple times by syzkaller, a kernel fuzzing tool, confirming its reliability and reproducibility. The fix implemented disables interrupts during the bus reset process, preventing the erroneous interrupt handling and restoring proper operation. This vulnerability requires local privileges with high-level permissions (PR:H) to exploit and does not require user interaction. The CVSS v3.1 score is 6.0, indicating a medium severity level, with a high impact on confidentiality and availability but no impact on integrity. The attack vector is local, and the complexity is low, but the attacker must have elevated privileges to exploit it. No known exploits are currently reported in the wild.

Potential Impact

For European organizations, the impact of CVE-2021-47153 primarily concerns systems running Linux kernels with the vulnerable i2c-i801 driver enabled, especially on Intel-based hardware platforms. This vulnerability can lead to kernel crashes or denial of service conditions, potentially disrupting critical services or embedded systems relying on I2C communications. Industries such as manufacturing, telecommunications, and critical infrastructure that use Linux-based embedded devices or servers with Intel chipsets may experience operational interruptions. Confidentiality impact is high because out-of-range memory access could potentially be leveraged to read sensitive kernel memory, though no direct integrity impact is noted. The requirement for local high privileges limits remote exploitation, but insider threats or compromised accounts could exploit this vulnerability to escalate denial-of-service attacks or cause system instability. Given the widespread use of Linux in European IT environments, especially in servers and embedded devices, unpatched systems could face increased downtime and reliability issues, affecting business continuity and operational technology environments.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the patch disabling interrupts during bus reset in the i2c-i801 driver. Specifically, kernel maintainers and system administrators should verify that their kernel versions incorporate the fix for CVE-2021-47153. For embedded and industrial Linux systems where kernel updates may be slower, consider implementing temporary mitigations such as disabling or limiting access to the i2c-i801 driver if feasible, or restricting local user privileges to prevent exploitation. Monitoring kernel logs for unusual i2c-i801 interrupt activity or bus reset failures can help detect attempted exploitation. Additionally, enforce strict access controls and audit local privileged accounts to reduce the risk of insider exploitation. Organizations should also engage with hardware and OS vendors to ensure timely patch deployment and validate that embedded devices receive firmware or kernel updates addressing this vulnerability. Finally, incorporate this vulnerability into vulnerability management and incident response plans to ensure rapid detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-03-04T18:12:48.846Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9834c4522896dcbe9ed9

Added to database: 5/21/2025, 9:09:08 AM

Last enriched: 6/26/2025, 7:20:19 PM

Last updated: 7/30/2025, 2:11:13 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats