Home

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix KASAN global-out-of-bounds warning When running "perf mem record" command on CWF, the below KASAN global-out-of-bounds warning is seen. ================================================================== BUG: KASAN: global-out-of-bounds in cmt_latency_data+0x176/0x1b0 Read of size 4 at addr ffffffffb721d000 by task dtlb/9850 Call Trace: kasan_report+0xb8/0xf0 cmt_latency_data+0x176/0x1b0 setup_arch_pebs_sample_data+0xf49/0x2560 intel_pmu_drain_arch_pebs+0x577/0xb00 handle_pmi_common+0x6c4/0xc80 The issue is caused by below code in __grt_latency_data(). The code tries to access x86_hybrid_pmu structure which doesn't exist on non-hybrid platform like CWF. WARN_ON_ONCE(hybrid_pmu(event->pmu)->pmu_type == hybrid_big) So add is_hybrid() check before calling this WARN_ON_ONCE to fix the global-out-of-bounds access issue.

PUBLISHED Reserved 2025-04-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

090262439f66df03d4e9d0e52e14104b729e2ef8 (git) before 1b61a1da3d8105ea1be548c94c2856697eb7ffd1
affected

090262439f66df03d4e9d0e52e14104b729e2ef8 (git) before 710a72e81a7028e1ad1a10eb14f941f8dd45ffd3
affected

090262439f66df03d4e9d0e52e14104b729e2ef8 (git) before 0ba6502ce167fc3d598c08c2cc3b4ed7ca5aa251
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.12.58 (semver)
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1b61a1da3d8105ea1be548c94c2856697eb7ffd1

git.kernel.org/...c/710a72e81a7028e1ad1a10eb14f941f8dd45ffd3

git.kernel.org/...c/0ba6502ce167fc3d598c08c2cc3b4ed7ca5aa251

cve.org (CVE-2025-40359)

nvd.nist.gov (CVE-2025-40359)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.