Bug 1225496 (CVE-2021-47561) - VUL-0: CVE-2021-47561: kernel: i2c: virtio: disable timeout handling
Summary: VUL-0: CVE-2021-47561: kernel: i2c: virtio: disable timeout handling
Status: RESOLVED FIXED
Alias: CVE-2021-47561
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/407718/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-47561:7.1:(AV:...
Keywords:
Depends on:
Blocks: 1227701
  Show dependency treegraph
 
Reported: 2024-05-28 12:34 UTC by SMASH SMASH
Modified: 2024-07-12 09:06 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-28 12:34:12 UTC
In the Linux kernel, the following vulnerability has been resolved:

i2c: virtio: disable timeout handling

If a timeout is hit, it can result is incorrect data on the I2C bus
and/or memory corruptions in the guest since the device can still be
operating on the buffers it was given while the guest has freed them.

Here is, for example, the start of a slub_debug splat which was
triggered on the next transfer after one transfer was forced to timeout
by setting a breakpoint in the backend (rust-vmm/vhost-device):

 BUG kmalloc-1k (Not tainted): Poison overwritten
 First byte 0x1 instead of 0x6b
 Allocated in virtio_i2c_xfer+0x65/0x35c age=350 cpu=0 pid=29
 	__kmalloc+0xc2/0x1c9
 	virtio_i2c_xfer+0x65/0x35c
 	__i2c_transfer+0x429/0x57d
 	i2c_transfer+0x115/0x134
 	i2cdev_ioctl_rdwr+0x16a/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41
 Freed in virtio_i2c_xfer+0x32e/0x35c age=244 cpu=0 pid=29
 	kfree+0x1bd/0x1cc
 	virtio_i2c_xfer+0x32e/0x35c
 	__i2c_transfer+0x429/0x57d
 	i2c_transfer+0x115/0x134
 	i2cdev_ioctl_rdwr+0x16a/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41

There is no simple fix for this (the driver would have to always create
bounce buffers and hold on to them until the device eventually returns
the buffers), so just disable the timeout support for now.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47561
https://www.cve.org/CVERecord?id=CVE-2021-47561
https://git.kernel.org/stable/c/84e1d0bf1d7121759622dabf8fbef4c99ad597c5
https://git.kernel.org/stable/c/cc432b0727ce404cc13e8f6b5ce29f412c3f9f1f
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2021/CVE-2021-47561.mbox
https://bugzilla.redhat.com/show_bug.cgi?id=2283388
Comment 1 Ivan Ivanov 2024-06-04 10:49:56 UTC
i2c-virtio module was first introduced in SLE 15-SP6. 
Offending commit and fix are already part of the base
kernel version. 

Not affected. Back to security team.