CVE-2025-68370
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
29/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
coresight: tmc: add the handle of the event to the path<br />
<br />
The handle is essential for retrieving the AUX_EVENT of each CPU and is<br />
required in perf mode. It has been added to the coresight_path so that<br />
dependent devices can access it from the path when needed.<br />
<br />
The existing bug can be reproduced with:<br />
perf record -e cs_etm//k -C 0-9 dd if=/dev/zero of=/dev/null<br />
<br />
Showing an oops as follows:<br />
Unable to handle kernel paging request at virtual address 000f6e84934ed19e<br />
<br />
Call trace:<br />
tmc_etr_get_buffer+0x30/0x80 [coresight_tmc] (P)<br />
catu_enable_hw+0xbc/0x3d0 [coresight_catu]<br />
catu_enable+0x70/0xe0 [coresight_catu]<br />
coresight_enable_path+0xb0/0x258 [coresight]



