-

CVE-2025-39681

In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

Since

  923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")

resctrl_cpu_detect() has been moved from common CPU initialization code to
the vendor-specific BSP init helper, while Hygon didn't put that call in their
code.

This triggers a division by zero fault during early booting stage on our
machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries
to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.

Add the missing resctrl_cpu_detect() in the Hygon BSP init helper.

  [ bp: Massage commit message. ]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 62f12cde10118253348a7540e85606869bd69432
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < 873f32201df8876bdb2563e3187e79149427cab4
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < fb81222c1559f89bfe3aa1010f6d112531d55353
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < 7207923d8453ebfb35667c1736169f2dd796772e
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < a9e5924daa954c9f585c1ca00358afe71d6781c4
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < d23264c257a70dbe021b43b3bc2ee16134cd2c69
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
Version < d8df126349dad855cdfedd6bbf315bad2e901c2f
Version 923f3a2b48bdccb6a1d1f0dd48de03de7ad936d9
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.8
Status affected
Version < 5.8
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.242
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.44
Status unaffected
Version <= 6.16.*
Version 6.16.4
Status unaffected
Version <= *
Version 6.17-rc3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.092
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string