Description
In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix NULL event access and potential PEBS record loss When intel_pmu_drain_pebs_icl() is called to drain PEBS records, the perf_event_overflow() could be called to process the last PEBS record. While perf_event_overflow() could trigger the interrupt throttle and stop all events of the group, like what the below call-chain shows. perf_event_overflow() -> __perf_event_overflow() ->__perf_event_account_interrupt() -> perf_event_throttle_group() -> perf_event_throttle() -> event->pmu->stop() -> x86_pmu_stop() The side effect of stopping the events is that all corresponding event pointers in cpuc->events[] array are cleared to NULL. Assume there are two PEBS events (event a and event b) in a group. When intel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the last PEBS record of PEBS event a, interrupt throttle is triggered and all pointers of event a and event b are cleared to NULL. Then intel_pmu_drain_pebs_icl() tries to process the last PEBS record of event b and encounters NULL pointer access. To avoid this issue, move cpuc->events[] clearing from x86_pmu_stop() to x86_pmu_del(). It's safe since cpuc->active_mask or cpuc->pebs_enabled is always checked before access the event pointer from cpuc->events[].
Product status
9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before cf69b99805c263117305ac6dffbc85aaf9259d32
9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before 6b089028bff1f2ff9e0c62b8f1faca1a620e5d6e
9734e25fbf5ae68eb04234b2cd14a4b36ab89141 (git) before 7e772a93eb61cb6265bdd1c5bde17d0f2718b452
6.16
Any version before 6.16
6.17.13 (semver)
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/cf69b99805c263117305ac6dffbc85aaf9259d32
git.kernel.org/...c/6b089028bff1f2ff9e0c62b8f1faca1a620e5d6e
git.kernel.org/...c/7e772a93eb61cb6265bdd1c5bde17d0f2718b452
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.