Skip to main content

CVE-2020-36787: Vulnerability in Linux Linux

High
VulnerabilityCVE-2020-36787cvecve-2020-36787
Published: Wed Feb 28 2024 (02/28/2024, 08:13:07 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: fix clock handling logic Video engine uses eclk and vclk for its clock sources and its reset control is coupled with eclk so the current clock enabling sequence works like below. Enable eclk De-assert Video Engine reset 10ms delay Enable vclk It introduces improper reset on the Video Engine hardware and eventually the hardware generates unexpected DMA memory transfers that can corrupt memory region in random and sporadic patterns. This issue is observed very rarely on some specific AST2500 SoCs but it causes a critical kernel panic with making a various shape of signature so it's extremely hard to debug. Moreover, the issue is observed even when the video engine is not actively used because udevd turns on the video engine hardware for a short time to make a query in every boot. To fix this issue, this commit changes the clock handling logic to make the reset de-assertion triggered after enabling both eclk and vclk. Also, it adds clk_unprepare call for a case when probe fails. clk: ast2600: fix reset settings for eclk and vclk Video engine reset setting should be coupled with eclk to match it with the setting for previous Aspeed SoCs which is defined in clk-aspeed.c since all Aspeed SoCs are sharing a single video engine driver. Also, reset bit 6 is defined as 'Video Engine' reset in datasheet so it should be de-asserted when eclk is enabled. This commit fixes the setting.

AI-Powered Analysis

AILast updated: 06/26/2025, 10:20:20 UTC

Technical Analysis

CVE-2020-36787 is a vulnerability identified in the Linux kernel specifically affecting the media subsystem for Aspeed AST2500 and AST2600 System on Chips (SoCs). The issue arises from improper clock and reset handling logic in the video engine hardware driver. The video engine relies on two clock sources, eclk and vclk, with reset control coupled to eclk. The flawed sequence enables eclk, de-asserts the video engine reset, waits 10ms, then enables vclk. This sequence can cause improper reset behavior, leading the video engine hardware to generate unexpected Direct Memory Access (DMA) transfers. These sporadic and random DMA operations can corrupt memory regions unpredictably, causing critical kernel panics with varying signatures, making debugging extremely difficult. Notably, this issue can occur even when the video engine is not actively used, as the udev daemon briefly activates the video engine during system boot to query hardware. The fix involves changing the clock handling logic to de-assert the reset only after both eclk and vclk are enabled, and adding proper cleanup calls (clk_unprepare) if the probe fails. Additionally, the reset settings for eclk and vclk on AST2600 are adjusted to align with previous Aspeed SoCs, ensuring the reset bit controlling the video engine is de-asserted only when eclk is enabled, as per the hardware datasheet. This vulnerability is specific to certain Aspeed SoCs used in embedded systems and server management controllers, and no known exploits in the wild have been reported to date.

Potential Impact

For European organizations, the impact of CVE-2020-36787 depends largely on the deployment of affected Aspeed AST2500/AST2600 SoCs within their infrastructure. These SoCs are commonly found in Baseboard Management Controllers (BMCs) used in server management, particularly in data centers and enterprise-grade hardware. A kernel panic caused by this vulnerability can lead to unexpected system crashes, resulting in denial of service conditions. Memory corruption caused by errant DMA transfers could also potentially be leveraged to destabilize systems or cause data integrity issues, although no direct exploitation has been observed. For critical infrastructure operators, cloud service providers, and enterprises relying on Linux-based servers with affected hardware, this vulnerability could disrupt availability and complicate incident response due to the sporadic and hard-to-debug nature of the crashes. While confidentiality and integrity impacts are less clear without active exploitation, the instability and potential for system downtime pose significant operational risks. The fact that the issue can manifest even without active video engine use increases the attack surface, as normal system boot processes can trigger the fault.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to incorporate the patch that corrects the clock and reset handling logic for the Aspeed video engine driver. Specifically, ensure that kernel versions include the fix that defers reset de-assertion until both eclk and vclk clocks are enabled and that proper cleanup is performed on probe failures. Organizations should audit their hardware inventory to identify systems using AST2500 or AST2600 SoCs, typically found in BMCs or embedded server management controllers. For affected systems where immediate patching is not feasible, consider isolating or limiting access to management interfaces to reduce risk exposure. Monitoring system logs for unexplained kernel panics or memory corruption signatures related to the video engine may help detect attempts to trigger the vulnerability. Collaborate with hardware vendors to confirm firmware and driver updates are applied. Additionally, implement robust backup and recovery procedures to mitigate potential data loss or downtime caused by unexpected crashes. Since no known exploits exist, proactive patching and hardware inventory management are the most effective defenses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-26T17:07:27.435Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9835c4522896dcbea600

Added to database: 5/21/2025, 9:09:09 AM

Last enriched: 6/26/2025, 10:20:20 AM

Last updated: 8/2/2025, 12:31:28 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats