Home

Description

In the Linux kernel, the following vulnerability has been resolved: coresight: tmc: add the handle of the event to the path The handle is essential for retrieving the AUX_EVENT of each CPU and is required in perf mode. It has been added to the coresight_path so that dependent devices can access it from the path when needed. The existing bug can be reproduced with: perf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null Showing an oops as follows: Unable to handle kernel paging request at virtual address 000f6e84934ed19e Call trace: tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P) catu_enable_hw+0xbc/0x3d0 [coresight_catu] catu_enable+0x70/0xe0 [coresight_catu] coresight_enable_path+0xb0/0x258 [coresight]

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

080ee83cc361451a7de7b5486c7f96ce454f7203 (git) before faa8f38f7ccb344ace2c1f364efc70e3a12d32f3
affected

080ee83cc361451a7de7b5486c7f96ce454f7203 (git) before d0c9effd82f2c19b92acd07d357fac5f392d549a
affected

080ee83cc361451a7de7b5486c7f96ce454f7203 (git) before aaa5abcc9d44d2c8484f779ab46d242d774cabcb
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.17.13 (semver)
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/faa8f38f7ccb344ace2c1f364efc70e3a12d32f3

git.kernel.org/...c/d0c9effd82f2c19b92acd07d357fac5f392d549a

git.kernel.org/...c/aaa5abcc9d44d2c8484f779ab46d242d774cabcb

cve.org (CVE-2025-68370)

nvd.nist.gov (CVE-2025-68370)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.