{"id":"CVE-2025-39681","summary":"x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper\n\nSince\n\n  923f3a2b48bd (\"x86/resctrl: Query LLC monitoring properties once during boot\")\n\nresctrl_cpu_detect() has been moved from common CPU initialization code to\nthe vendor-specific BSP init helper, while Hygon didn't put that call in their\ncode.\n\nThis triggers a division by zero fault during early booting stage on our\nmachines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries\nto calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.\n\nAdd the missing resctrl_cpu_detect() in the Hygon BSP init helper.\n\n  [ bp: Massage commit message. ]","modified":"2026-03-20T12:43:00.202059Z","published":"2025-09-05T17:20:47.564Z","related":["MGASA-2025-0234","MGASA-2025-0235","SUSE-SU-2025:03600-1","SUSE-SU-2025:03601-1","SUSE-SU-2025:03633-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2025:3725-1","SUSE-SU-2025:3751-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39681.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/62f12cde10118253348a7540e85606869bd69432"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7207923d8453ebfb35667c1736169f2dd796772e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/873f32201df8876bdb2563e3187e79149427cab4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9e5924daa954c9f585c1ca00358afe71d6781c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d23264c257a70dbe021b43b3bc2ee16134cd2c69"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8df126349dad855cdfedd6bbf315bad2e901c2f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fb81222c1559f89bfe3aa1010f6d112531d55353"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39681.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-39681"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9"},{"fixed":"62f12cde10118253348a7540e85606869bd69432"},{"fixed":"873f32201df8876bdb2563e3187e79149427cab4"},{"fixed":"fb81222c1559f89bfe3aa1010f6d112531d55353"},{"fixed":"7207923d8453ebfb35667c1736169f2dd796772e"},{"fixed":"a9e5924daa954c9f585c1ca00358afe71d6781c4"},{"fixed":"d23264c257a70dbe021b43b3bc2ee16134cd2c69"},{"fixed":"d8df126349dad855cdfedd6bbf315bad2e901c2f"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39681.json"}}],"schema_version":"1.7.5"}