VYPR
Medium severity5.5NVD Advisory· Published Sep 5, 2025· Updated May 12, 2026

CVE-2025-39681

CVE-2025-39681

Description

In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

Since

923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")

resctrl_cpu_detect() has been moved from common CPU initialization code to the vendor-specific BSP init helper, while Hygon didn't put that call in their code.

This triggers a division by zero fault during early booting stage on our machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.

Add the missing resctrl_cpu_detect() in the Hygon BSP init helper.

[ bp: Massage commit message. ]

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing resctrl_cpu_detect() in Hygon CPU init causes division-by-zero during boot on systems with CQM features.

The vulnerability is a missing call to resctrl_cpu_detect() in the Hygon vendor-specific BSP init helper, introduced by a prior commit that moved the detection from common code. Without this, boot_cpu_data.x86_cache_occ_scale remains uninitialized, causing a division-by-zero fault in get_rdt_mon_resources() when it calculates mon_l3_config. This affects Hygon CPUs with X86_FEATURE_CQM* support. [1]

Exploitation occurs automatically during early boot on affected systems; no authentication or network access is required. Any boot of a vulnerable kernel leads to a crash, resulting in denial of service. The attacker only needs local access to trigger a reboot, or the system may crash on its own.

The impact is a complete system crash during boot, rendering the system unusable. This can cause downtime for devices such as Siemens SIMATIC CN 4100 that use vulnerable kernel versions. [1]

The fix is to add the missing resctrl_cpu_detect() call in the Hygon BSP init helper. Patches have been applied to the Linux kernel stable branches. [2][3][4] Users should update to patched kernels or backport the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

1