@Di4na @camdoncady @dangoodin @joshbressers @kurtseifried @gregkh "he can knows" -- that's not english. Yes, sometimes it may be hard to decide if something is vulnerability or not. But sometimes it is very easy to see that it is not vulnerability, and we get it in CVE anyway. Look at the CVE below. It is clear that's a random bug, not anything attacker can exploit. It would be clear to Greg, too, if he spent 30 seconds analyzing it. But he did not. Plus, those copy/pasted descriptions make no sense. CVE-2023-52882 "Description
In the Linux kernel, the following vulnerability has been resolved: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change While PLL CPUX clock rate change when CPU is running from it works in vast majority of cases, now and then it causes instability." Is it considered ok to generate CVE descriptions that are not even close to valid english?