CVE-2025-38633 (GCVE-0-2025-38633)
Vulnerability from cvelistv5
Published
2025-08-22 16:00
Modified
2025-08-22 16:00
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: clk: spacemit: mark K1 pll1_d8 as critical The pll1_d8 clock is enabled by the boot loader, and is ultimately a parent for numerous clocks, including those used by APB and AXI buses. Guodong Xu discovered that this clock got disabled while responding to getting -EPROBE_DEFER when requesting a reset controller. The needed clock (CLK_DMA, along with its parents) had already been enabled. To respond to the probe deferral return, the CLK_DMA clock was disabled, and this led to parent clocks also reducing their enable count. When the enable count for pll1_d8 was decremented it became 0, which caused it to be disabled. This led to a system hang. Marking that clock critical resolves this by preventing it from being disabled. Define a new macro CCU_FACTOR_GATE_DEFINE() to allow clock flags to be supplied for a CCU_FACTOR_GATE clock.
Impacted products
Vendor Product Version
Linux Linux Version: 1b72c59db0add8e47fa116b21f78ed0b09a264f3
Version: 1b72c59db0add8e47fa116b21f78ed0b09a264f3
Create a notification for this product.
   Linux Linux Version: 6.16
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/spacemit/ccu-k1.c",
            "drivers/clk/spacemit/ccu_mix.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "10948c00e548e9ad2ce9d765baf26dce2d9b806b",
              "status": "affected",
              "version": "1b72c59db0add8e47fa116b21f78ed0b09a264f3",
              "versionType": "git"
            },
            {
              "lessThan": "7554729de27daf6d54bcf8689d863bbe267828bf",
              "status": "affected",
              "version": "1b72c59db0add8e47fa116b21f78ed0b09a264f3",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/clk/spacemit/ccu-k1.c",
            "drivers/clk/spacemit/ccu_mix.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.16"
            },
            {
              "lessThan": "6.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.1",
                  "versionStartIncluding": "6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17-rc1",
                  "versionStartIncluding": "6.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: spacemit: mark K1 pll1_d8 as critical\n\nThe pll1_d8 clock is enabled by the boot loader, and is ultimately a\nparent for numerous clocks, including those used by APB and AXI buses.\nGuodong Xu discovered that this clock got disabled while responding to\ngetting -EPROBE_DEFER when requesting a reset controller.\n\nThe needed clock (CLK_DMA, along with its parents) had already been\nenabled.  To respond to the probe deferral return, the CLK_DMA clock\nwas disabled, and this led to parent clocks also reducing their enable\ncount.  When the enable count for pll1_d8 was decremented it became 0,\nwhich caused it to be disabled.  This led to a system hang.\n\nMarking that clock critical resolves this by preventing it from being\ndisabled.\n\nDefine a new macro CCU_FACTOR_GATE_DEFINE() to allow clock flags to\nbe supplied for a CCU_FACTOR_GATE clock."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-22T16:00:41.434Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/10948c00e548e9ad2ce9d765baf26dce2d9b806b"
        },
        {
          "url": "https://git.kernel.org/stable/c/7554729de27daf6d54bcf8689d863bbe267828bf"
        }
      ],
      "title": "clk: spacemit: mark K1 pll1_d8 as critical",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38633",
    "datePublished": "2025-08-22T16:00:41.434Z",
    "dateReserved": "2025-04-16T04:51:24.030Z",
    "dateUpdated": "2025-08-22T16:00:41.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38633\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-08-22T16:15:37.173\",\"lastModified\":\"2025-08-22T18:08:51.663\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nclk: spacemit: mark K1 pll1_d8 as critical\\n\\nThe pll1_d8 clock is enabled by the boot loader, and is ultimately a\\nparent for numerous clocks, including those used by APB and AXI buses.\\nGuodong Xu discovered that this clock got disabled while responding to\\ngetting -EPROBE_DEFER when requesting a reset controller.\\n\\nThe needed clock (CLK_DMA, along with its parents) had already been\\nenabled.  To respond to the probe deferral return, the CLK_DMA clock\\nwas disabled, and this led to parent clocks also reducing their enable\\ncount.  When the enable count for pll1_d8 was decremented it became 0,\\nwhich caused it to be disabled.  This led to a system hang.\\n\\nMarking that clock critical resolves this by preventing it from being\\ndisabled.\\n\\nDefine a new macro CCU_FACTOR_GATE_DEFINE() to allow clock flags to\\nbe supplied for a CCU_FACTOR_GATE clock.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/10948c00e548e9ad2ce9d765baf26dce2d9b806b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7554729de27daf6d54bcf8689d863bbe267828bf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…