Home

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix NULL event access and potential PEBS record loss When intel_pmu_drain_pebs_icl() is called to drain PEBS records, the perf_event_overflow() could be called to process the last PEBS record. While perf_event_overflow() could trigger the interrupt throttle and stop all events of the group, like what the below call-chain shows. perf_event_overflow() -> __perf_event_overflow() ->__perf_event_account_interrupt() -> perf_event_throttle_group() -> perf_event_throttle() -> event->pmu->stop() -> x86_pmu_stop() The side effect of stopping the events is that all corresponding event pointers in cpuc->events[] array are cleared to NULL. Assume there are two PEBS events (event a and event b) in a group. When intel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the last PEBS record of PEBS event a, interrupt throttle is triggered and all pointers of event a and event b are cleared to NULL. Then intel_pmu_drain_pebs_icl() tries to process the last PEBS record of event b and encounters NULL pointer access. To avoid this issue, move cpuc->events[] clearing from x86_pmu_stop() to x86_pmu_del(). It's safe since cpuc->active_mask or cpuc->pebs_enabled is always checked before access the event pointer from cpuc->events[].

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before cf69b99805c263117305ac6dffbc85aaf9259d32
affected

9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before 6b089028bff1f2ff9e0c62b8f1faca1a620e5d6e
affected

9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before 7e772a93eb61cb6265bdd1c5bde17d0f2718b452
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.17.13 (semver)
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/cf69b99805c263117305ac6dffbc85aaf9259d32

git.kernel.org/...c/6b089028bff1f2ff9e0c62b8f1faca1a620e5d6e

git.kernel.org/...c/7e772a93eb61cb6265bdd1c5bde17d0f2718b452

cve.org (CVE-2025-68375)

nvd.nist.gov (CVE-2025-68375)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.