CVE-2023-52882

In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change While PLL CPUX clock rate change when CPU is running from it works in vast majority of cases, now and then it causes instability. This leads to system crashes and other undefined behaviour. After a lot of testing (30+ hours) while also doing a lot of frequency switches, we can't observe any instability issues anymore when doing reparenting to stable clock like 24 MHz oscillator.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

22 Jan 2026, 20:23

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0b82eb134d2942ecc669e2ab2be3f0a58d79428a - () https://git.kernel.org/stable/c/0b82eb134d2942ecc669e2ab2be3f0a58d79428a - Patch
References () https://git.kernel.org/stable/c/70f64cb29014e4c4f1fabd3265feebd80590d069 - () https://git.kernel.org/stable/c/70f64cb29014e4c4f1fabd3265feebd80590d069 - Patch
References () https://git.kernel.org/stable/c/7e91ed763dc07437777bd012af7a2bd4493731ff - () https://git.kernel.org/stable/c/7e91ed763dc07437777bd012af7a2bd4493731ff - Patch
References () https://git.kernel.org/stable/c/9708e5081cfc4f085690294163389bcf82655f90 - () https://git.kernel.org/stable/c/9708e5081cfc4f085690294163389bcf82655f90 - Patch
References () https://git.kernel.org/stable/c/bfc78b4628497eb6df09a6b5bba9dd31616ee175 - () https://git.kernel.org/stable/c/bfc78b4628497eb6df09a6b5bba9dd31616ee175 - Patch
References () https://git.kernel.org/stable/c/f1fa9a9816204ac4b118b2e613d3a7c981355019 - () https://git.kernel.org/stable/c/f1fa9a9816204ac4b118b2e613d3a7c981355019 - Patch
References () https://git.kernel.org/stable/c/fe11826ffa200e1a7a826e745163cb2f47875f66 - () https://git.kernel.org/stable/c/fe11826ffa200e1a7a826e745163cb2f47875f66 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240912-0010/ - () https://security.netapp.com/advisory/ntap-20240912-0010/ - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -
  • () https://security.netapp.com/advisory/ntap-20240912-0010/ -
References () https://git.kernel.org/stable/c/0b82eb134d2942ecc669e2ab2be3f0a58d79428a - () https://git.kernel.org/stable/c/0b82eb134d2942ecc669e2ab2be3f0a58d79428a -
References () https://git.kernel.org/stable/c/70f64cb29014e4c4f1fabd3265feebd80590d069 - () https://git.kernel.org/stable/c/70f64cb29014e4c4f1fabd3265feebd80590d069 -
References () https://git.kernel.org/stable/c/7e91ed763dc07437777bd012af7a2bd4493731ff - () https://git.kernel.org/stable/c/7e91ed763dc07437777bd012af7a2bd4493731ff -
References () https://git.kernel.org/stable/c/9708e5081cfc4f085690294163389bcf82655f90 - () https://git.kernel.org/stable/c/9708e5081cfc4f085690294163389bcf82655f90 -
References () https://git.kernel.org/stable/c/bfc78b4628497eb6df09a6b5bba9dd31616ee175 - () https://git.kernel.org/stable/c/bfc78b4628497eb6df09a6b5bba9dd31616ee175 -
References () https://git.kernel.org/stable/c/f1fa9a9816204ac4b118b2e613d3a7c981355019 - () https://git.kernel.org/stable/c/f1fa9a9816204ac4b118b2e613d3a7c981355019 -
References () https://git.kernel.org/stable/c/fe11826ffa200e1a7a826e745163cb2f47875f66 - () https://git.kernel.org/stable/c/fe11826ffa200e1a7a826e745163cb2f47875f66 -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 14:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: sunxi-ng: h6: CPUX reparent durante el cambio de velocidad de CPUX de PLL. Mientras que el cambio de velocidad de reloj de CPUX de PLL cuando la CPU se está ejecutando, funciona en la gran mayoría de los casos, de vez en cuando provoca inestabilidad. Esto provoca fallos del sistema y otros comportamientos indefinidos. Después de muchas pruebas (más de 30 horas) y al mismo tiempo realizar muchos cambios de frecuencia, ya no podemos observar ningún problema de inestabilidad al realizar la reparación a un reloj estable como un oscilador de 24 MHz.

30 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-30 16:15

Updated : 2026-01-22 20:23


NVD link : CVE-2023-52882

Mitre link : CVE-2023-52882

CVE.ORG link : CVE-2023-52882


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel