CVE-2025-38633Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 22

Description

In the Linux kernel, the following vulnerability has been resolved: clk: spacemit: mark K1 pll1_d8 as critical The pll1_d8 clock is enabled by the boot loader, and is ultimately a parent for numerous clocks, including those used by APB and AXI buses. Guodong Xu discovered that this clock got disabled while responding to getting -EPROBE_DEFER when requesting a reset controller. The needed clock (CLK_DMA, along with its parents) had already been enabled. To respond to the probe deferral return,

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5linux/linux1b72c59db0add8e47fa116b21f78ed0b09a264f310948c00e548e9ad2ce9d765baf26dce2d9b806b+2
debiandebian/linux

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-38633: In the Linux kernel, the following vulnerability has been resolved: clk: spacemit: mark K1 pll1_d8 as critical The pll1_d8 clock is enabled by the boo2025-08-22
GHSA
GHSA-xp55-qmgg-q2rh: In the Linux kernel, the following vulnerability has been resolved: clk: spacemit: mark K1 pll1_d8 as critical The pll1_d8 clock is enabled by the b2025-08-22

📋Vendor Advisories

2
Red Hat
kernel: clk: spacemit: mark K1 pll1_d8 as critical2025-08-22
Debian
CVE-2025-38633: linux - In the Linux kernel, the following vulnerability has been resolved: clk: spacem...2025
CVE-2025-38633 — Linux vulnerability | cvebase