๐Ÿ” CVE Alert

CVE-2025-39681

UNKNOWN 0.0

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper Since 923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot") resctrl_cpu_detect() has been moved from common CPU initialization code to the vendor-specific BSP init helper, while Hygon didn't put that call in their code. This triggers a division by zero fault during early booting stage on our machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale. Add the missing resctrl_cpu_detect() in the Hygon BSP init helper. [ bp: Massage commit message. ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 5, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < 62f12cde10118253348a7540e85606869bd69432 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < 873f32201df8876bdb2563e3187e79149427cab4 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < fb81222c1559f89bfe3aa1010f6d112531d55353 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < 7207923d8453ebfb35667c1736169f2dd796772e 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < a9e5924daa954c9f585c1ca00358afe71d6781c4 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < d23264c257a70dbe021b43b3bc2ee16134cd2c69 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9 < d8df126349dad855cdfedd6bbf315bad2e901c2f
Linux / Linux
5.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/62f12cde10118253348a7540e85606869bd69432 git.kernel.org: https://git.kernel.org/stable/c/873f32201df8876bdb2563e3187e79149427cab4 git.kernel.org: https://git.kernel.org/stable/c/fb81222c1559f89bfe3aa1010f6d112531d55353 git.kernel.org: https://git.kernel.org/stable/c/7207923d8453ebfb35667c1736169f2dd796772e git.kernel.org: https://git.kernel.org/stable/c/a9e5924daa954c9f585c1ca00358afe71d6781c4 git.kernel.org: https://git.kernel.org/stable/c/d23264c257a70dbe021b43b3bc2ee16134cd2c69 git.kernel.org: https://git.kernel.org/stable/c/d8df126349dad855cdfedd6bbf315bad2e901c2f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html