CVE-2025-39752

In the Linux kernel, the following vulnerability has been resolved: ARM: rockchip: fix kernel hang during smp initialization In order to bring up secondary CPUs main CPU write trampoline code to SRAM. The trampoline code is written while secondary CPUs are powered on (at least that true for RK3188 CPU). Sometimes that leads to kernel hang. Probably because secondary CPU execute trampoline code while kernel doesn't expect. The patch moves SRAM initialization step to the point where all secondary CPUs are powered down. That fixes rarely hangs on RK3188: [ 0.091568] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000 [ 0.091996] rockchip_smp_prepare_cpus: ncores 4
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 18:53

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0223a3683d502b7e5eb2eb4ad7e97363fa88d531 - () https://git.kernel.org/stable/c/0223a3683d502b7e5eb2eb4ad7e97363fa88d531 - Patch
References () https://git.kernel.org/stable/c/1eb67589a7e091b1e5108aab72fddbf4dc69af2c - () https://git.kernel.org/stable/c/1eb67589a7e091b1e5108aab72fddbf4dc69af2c - Patch
References () https://git.kernel.org/stable/c/265583266d93db4ff83d088819b1f63fdf0131db - () https://git.kernel.org/stable/c/265583266d93db4ff83d088819b1f63fdf0131db - Patch
References () https://git.kernel.org/stable/c/3c6bf7a324b8995b9c7d790c8d2abf0668f51551 - () https://git.kernel.org/stable/c/3c6bf7a324b8995b9c7d790c8d2abf0668f51551 - Patch
References () https://git.kernel.org/stable/c/47769dab9073a73e127aa0bfd0ba4c51eaccdc33 - () https://git.kernel.org/stable/c/47769dab9073a73e127aa0bfd0ba4c51eaccdc33 - Patch
References () https://git.kernel.org/stable/c/7cdb433bb44cdc87dc5260cdf15bf03cc1cd1814 - () https://git.kernel.org/stable/c/7cdb433bb44cdc87dc5260cdf15bf03cc1cd1814 - Patch
References () https://git.kernel.org/stable/c/888a453c2a239765a7ab4de8a3cedae2e3802528 - () https://git.kernel.org/stable/c/888a453c2a239765a7ab4de8a3cedae2e3802528 - Patch
References () https://git.kernel.org/stable/c/c0726d1e466e2d0da620836e293a59e6427ccdff - () https://git.kernel.org/stable/c/c0726d1e466e2d0da620836e293a59e6427ccdff - Patch
References () https://git.kernel.org/stable/c/d7d6d076ee9532c4668f14696a35688d35dd16f4 - () https://git.kernel.org/stable/c/d7d6d076ee9532c4668f14696a35688d35dd16f4 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

11 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-11 17:15

Updated : 2026-01-09 18:53


NVD link : CVE-2025-39752

Mitre link : CVE-2025-39752

CVE.ORG link : CVE-2025-39752


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel