Skip to main content

CVE-2024-53223: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-53223cvecve-2024-53223
Published: Fri Dec 27 2024 (12/27/2024, 13:50:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: clk: ralink: mtmips: fix clocks probe order in oldest ralink SoCs Base clocks are the first in being probed and are real dependencies of the rest of fixed, factor and peripheral clocks. For old ralink SoCs RT2880, RT305x and RT3883 'xtal' must be defined first since in any other case, when fixed clocks are probed they are delayed until 'xtal' is probed so the following warning appears: WARNING: CPU: 0 PID: 0 at drivers/clk/ralink/clk-mtmips.c:499 rt3883_bus_recalc_rate+0x98/0x138 Modules linked in: CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.43 #0 Stack : 805e58d0 00000000 00000004 8004f950 00000000 00000004 00000000 00000000 80669c54 80830000 80700000 805ae570 80670068 00000001 80669bf8 00000000 00000000 00000000 805ae570 80669b38 00000020 804db7dc 00000000 00000000 203a6d6d 80669b78 80669e48 70617773 00000000 805ae570 00000000 00000009 00000000 00000001 00000004 00000001 00000000 00000000 83fe43b0 00000000 ... Call Trace: [<800065d0>] show_stack+0x64/0xf4 [<804bca14>] dump_stack_lvl+0x38/0x60 [<800218ac>] __warn+0x94/0xe4 [<8002195c>] warn_slowpath_fmt+0x60/0x94 [<80259ff8>] rt3883_bus_recalc_rate+0x98/0x138 [<80254530>] __clk_register+0x568/0x688 [<80254838>] of_clk_hw_register+0x18/0x2c [<8070b910>] rt2880_clk_of_clk_init_driver+0x18c/0x594 [<8070b628>] of_clk_init+0x1c0/0x23c [<806fc448>] plat_time_init+0x58/0x18c [<806fdaf0>] time_init+0x10/0x6c [<806f9bc4>] start_kernel+0x458/0x67c ---[ end trace 0000000000000000 ]--- When this driver was mainlined we could not find any active users of old ralink SoCs so we cannot perform any real tests for them. Now, one user of a Belkin f9k1109 version 1 device which uses RT3883 SoC appeared and reported some issues in openWRT: - https://github.com/openwrt/openwrt/issues/16054 Thus, define a 'rt2880_xtal_recalc_rate()' just returning the expected frequency 40Mhz and use it along the old ralink SoCs to have a correct boot trace with no warnings and a working clock plan from the beggining.

AI-Powered Analysis

AILast updated: 06/28/2025, 10:56:04 UTC

Technical Analysis

CVE-2024-53223 addresses a vulnerability in the Linux kernel specifically related to the clock subsystem for older Ralink SoCs (System on Chips), including RT2880, RT305x, and RT3883. The issue arises from the improper probe order of clocks during kernel initialization. In these SoCs, the base clock 'xtal' must be defined and probed first because it is a fundamental dependency for other fixed, factor, and peripheral clocks. If 'xtal' is not probed first, the kernel delays the probing of fixed clocks, leading to warnings and potential instability during boot. The vulnerability manifests as a warning trace in the kernel logs, indicating a miscalculation or improper recalculation of bus clock rates, which can affect the correct initialization of the clock framework. This can cause boot issues or unstable clock configurations on affected devices. The problem was identified when a user of a Belkin F9K1109 v1 device, which uses the RT3883 SoC, reported issues in OpenWRT, a Linux-based firmware for routers. The fix involves defining a function 'rt2880_xtal_recalc_rate()' that returns the expected 40 MHz frequency for the 'xtal' clock and ensuring this clock is probed first to establish a correct and stable clock plan from the start. This vulnerability is specific to older Ralink SoCs and their clock driver implementation in the Linux kernel. No active exploitation has been reported, and the issue primarily affects devices using these legacy SoCs running Linux kernels prior to the fix. The vulnerability does not appear to directly enable privilege escalation or remote code execution but can cause system instability or boot failures on affected hardware.

Potential Impact

For European organizations, the impact of CVE-2024-53223 is primarily relevant to those using network infrastructure or embedded devices based on older Ralink SoCs, such as certain models of routers or IoT devices running Linux or OpenWRT firmware. The vulnerability can lead to boot instability or improper clock initialization, potentially causing device reboots, degraded performance, or loss of network connectivity. This can disrupt business operations relying on these devices for network access or IoT functionality. While the vulnerability does not directly expose data confidentiality or integrity, the availability of affected devices could be impacted, leading to denial of service conditions. Organizations in sectors with critical network infrastructure or industrial IoT deployments should be aware of this issue. However, the scope is limited because the affected SoCs are older and less common in modern deployments. The lack of known exploits in the wild reduces immediate risk, but unpatched devices could face operational issues or be more susceptible to other attacks if the instability is leveraged by attackers. Overall, the impact is moderate and mostly operational rather than security-critical for most European enterprises.

Mitigation Recommendations

1. Identify and inventory devices using affected Ralink SoCs (RT2880, RT305x, RT3883) within the organization, particularly routers and embedded Linux devices running OpenWRT or similar firmware. 2. Apply the Linux kernel patches that fix the clock probe order issue as soon as they become available, or update to a Linux kernel version that includes this fix. 3. For devices running OpenWRT or vendor firmware, check for updated firmware releases that incorporate the kernel fix and deploy them promptly. 4. If immediate patching is not possible, consider device replacement or isolating affected devices from critical network segments to reduce operational impact. 5. Monitor device logs for clock-related warnings or boot instability symptoms that may indicate the presence of this issue. 6. Engage with device vendors or maintainers to confirm support and patch availability for affected hardware. 7. Implement robust network monitoring to detect unusual device reboots or connectivity loss that could be related to this vulnerability. These steps go beyond generic advice by focusing on device identification, firmware updates, and operational monitoring specific to the affected hardware and software environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-11-19T17:17:25.024Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdefde

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 10:56:04 AM

Last updated: 8/12/2025, 1:36:31 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats