First published: Fri Nov 08 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D For i.MX7D DRAM related mux clock, the clock source change should ONLY be done done in low level asm code without accessing DRAM, and then calling clk API to sync the HW clock status with clk tree, it should never touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag should NOT be added, otherwise, DRAM's clock parent will be disabled when DRAM is active, and system will hang.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.10.227 | |
Linux Kernel | >=5.11<5.15.168 | |
Linux Kernel | >=5.16<6.1.113 | |
Linux Kernel | >=6.2<6.6.57 | |
Linux Kernel | >=6.7<6.11.4 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50181 has a medium severity rating due to potential risks associated with improper clock source changes in the Linux kernel.
CVE-2024-50181 affects versions of the Linux kernel up to 5.10.227 and between 5.11 and 6.6.57.
To fix CVE-2024-50181, upgrade to version 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1 of the Linux package.
CVE-2024-50181 involves improper handling of clock source changes for the i.MX7D DRAM related mux clock in the Linux kernel.
Currently, there is no documented workaround for CVE-2024-50181, and it is recommended to apply the available patches.