跳转到帖子

Ubuntu: (CVE-2020-36787): linux vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2020-36787): linux vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
02/28/2024
Created
11/21/2024
Added
11/19/2024
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: fix clock handling logic Video engine uses eclk and vclk for its clock sources and its reset control is coupled with eclk so the current clock enabling sequence works like below. Enable eclk De-assert Video Engine reset 10ms delay Enable vclk It introduces improper reset on the Video Engine hardware and eventually the hardware generates unexpected DMA memory transfers that can corrupt memory region in random and sporadic patterns. This issue is observed very rarely on some specific AST2500 SoCs but it causes a critical kernel panic with making a various shape of signature so it's extremely hard to debug. Moreover, the issue is observed even when the video engine is not actively used because udevd turns on the video engine hardware for a short time to make a query in every boot. To fix this issue, this commit changes the clock handling logic to make the reset de-assertion triggered after enabling both eclk and vclk. Also, it adds clk_unprepare call for a case when probe fails. clk: ast2600: fix reset settings for eclk and vclk Video engine reset setting should be coupled with eclk to match it with the setting for previous Aspeed SoCs which is defined in clk-aspeed.c since all Aspeed SoCs are sharing a single video engine driver. Also, reset bit 6 is defined as 'Video Engine' reset in datasheet so it should be de-asserted when eclk is enabled. This commit fixes the setting.

Solution(s)

  • ubuntu-upgrade-linux
  • ubuntu-upgrade-linux-aws
  • ubuntu-upgrade-linux-aws-5-4
  • ubuntu-upgrade-linux-aws-fips
  • ubuntu-upgrade-linux-azure
  • ubuntu-upgrade-linux-azure-5-4
  • ubuntu-upgrade-linux-azure-fips
  • ubuntu-upgrade-linux-bluefield
  • ubuntu-upgrade-linux-fips
  • ubuntu-upgrade-linux-gcp
  • ubuntu-upgrade-linux-gcp-5-4
  • ubuntu-upgrade-linux-gcp-fips
  • ubuntu-upgrade-linux-gkeop
  • ubuntu-upgrade-linux-hwe-5-4
  • ubuntu-upgrade-linux-kvm
  • ubuntu-upgrade-linux-oracle
  • ubuntu-upgrade-linux-oracle-5-4
  • ubuntu-upgrade-linux-raspi
  • ubuntu-upgrade-linux-raspi-5-4

References

  • https://attackerkb.com/topics/cve-2020-36787
  • CVE - 2020-36787
  • https://git.kernel.org/linus/3536169f8531c2c5b153921dc7d1ac9fd570cda7
  • https://git.kernel.org/stable/c/1dc1d30ac101bb8335d9852de2107af60c2580e7
  • https://git.kernel.org/stable/c/2964c37563e86cfdc439f217eb3c5a69adfdba6a
  • https://git.kernel.org/stable/c/3536169f8531c2c5b153921dc7d1ac9fd570cda7
  • https://git.kernel.org/stable/c/75321dc8aebe3f30eff226028fe6da340fe0bf02
  • https://git.kernel.org/stable/c/a59d01384c80a8a4392665802df57c3df20055f5
  • https://www.cve.org/CVERecord?id=CVE-2020-36787
View more
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…