clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change
While PLL CPUX clock rate change when CPU is running from it works in
vast majority of cases, now and then it causes instability. This leads
to system crashes and other undefined behaviour. After a lot of testing
(30+ hours) while also doing a lot of frequency switches, we can't
observe any instability issues anymore when doing reparenting to stable
clock like 24 MHz oscillator.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3843-1 | linux-5.10 security update |
Debian DSA |
DSA-5703-1 | linux security update |
Ubuntu USN |
USN-6949-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6949-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6950-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6950-4 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-6951-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6951-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6951-4 | Linux kernel (BlueField) vulnerabilities |
Ubuntu USN |
USN-6952-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6953-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6956-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6957-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6979-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7019-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 23 Jan 2026 08:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 11 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 22 Nov 2024 21:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 Nov 2024 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Sep 2024 22:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T07:45:11.091Z
Reserved: 2024-05-21T15:35:00.781Z
Link: CVE-2023-52882
Updated: 2024-09-11T12:42:27.452Z
Status : Analyzed
Published: 2024-05-30T16:15:09.937
Modified: 2026-01-22T20:23:53.507
Link: CVE-2023-52882
OpenCVE Enrichment
Updated: 2025-07-13T07:15:57Z
Debian DLA
Debian DSA
Ubuntu USN