In the Linux kernel, the following vulnerability has been resolved:
ARM: rockchip: fix kernel hang during smp initialization
In order to bring up secondary CPUs main CPU write trampoline
code to SRAM. The trampoline code is written while secondary
CPUs are powered on (at least that true for RK3188 CPU).
Sometimes that leads to kernel hang. Probably because secondary
CPU execute trampoline code while kernel doesn't expect.
The patch moves SRAM initialization step to the point where all
secondary CPUs are powered down.
That fixes rarely hangs on RK3188:
[ 0.091568] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000
[ 0.091996] rockchip_smp_prepare_cpus: ncores 4
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
09 Jan 2026, 18:53
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/0223a3683d502b7e5eb2eb4ad7e97363fa88d531 - Patch | |
| References | () https://git.kernel.org/stable/c/1eb67589a7e091b1e5108aab72fddbf4dc69af2c - Patch | |
| References | () https://git.kernel.org/stable/c/265583266d93db4ff83d088819b1f63fdf0131db - Patch | |
| References | () https://git.kernel.org/stable/c/3c6bf7a324b8995b9c7d790c8d2abf0668f51551 - Patch | |
| References | () https://git.kernel.org/stable/c/47769dab9073a73e127aa0bfd0ba4c51eaccdc33 - Patch | |
| References | () https://git.kernel.org/stable/c/7cdb433bb44cdc87dc5260cdf15bf03cc1cd1814 - Patch | |
| References | () https://git.kernel.org/stable/c/888a453c2a239765a7ab4de8a3cedae2e3802528 - Patch | |
| References | () https://git.kernel.org/stable/c/c0726d1e466e2d0da620836e293a59e6427ccdff - Patch | |
| References | () https://git.kernel.org/stable/c/d7d6d076ee9532c4668f14696a35688d35dd16f4 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
11 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-11 17:15
Updated : 2026-01-09 18:53
NVD link : CVE-2025-39752
Mitre link : CVE-2025-39752
CVE.ORG link : CVE-2025-39752
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
