CVE-2025-68798
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2026
Last modified:
13/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
perf/x86/amd: Check event before enable to avoid GPF<br />
<br />
On AMD machines cpuc->events[idx] can become NULL in a subtle race<br />
condition with NMI->throttle->x86_pmu_stop().<br />
<br />
Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.<br />
This appears to be an AMD only issue.<br />
<br />
Syzkaller reported a GPF in amd_pmu_enable_all.<br />
<br />
INFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143<br />
msecs<br />
Oops: general protection fault, probably for non-canonical address<br />
0xdffffc0000000034: 0000 PREEMPT SMP KASAN NOPTI<br />
KASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7]<br />
CPU: 0 UID: 0 PID: 328415 Comm: repro_36674776 Not tainted 6.12.0-rc1-syzk<br />
RIP: 0010:x86_pmu_enable_event (arch/x86/events/perf_event.h:1195<br />
arch/x86/events/core.c:1430)<br />
RSP: 0018:ffff888118009d60 EFLAGS: 00010012<br />
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000<br />
RDX: 0000000000000034 RSI: 0000000000000000 RDI: 00000000000001a0<br />
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000<br />
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002<br />
R13: ffff88811802a440 R14: ffff88811802a240 R15: ffff8881132d8601<br />
FS: 00007f097dfaa700(0000) GS:ffff888118000000(0000) GS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00000000200001c0 CR3: 0000000103d56000 CR4: 00000000000006f0<br />
Call Trace:<br />
<br />
amd_pmu_enable_all (arch/x86/events/amd/core.c:760 (discriminator 2))<br />
x86_pmu_enable (arch/x86/events/core.c:1360)<br />
event_sched_out (kernel/events/core.c:1191 kernel/events/core.c:1186<br />
kernel/events/core.c:2346)<br />
__perf_remove_from_context (kernel/events/core.c:2435)<br />
event_function (kernel/events/core.c:259)<br />
remote_function (kernel/events/core.c:92 (discriminator 1)<br />
kernel/events/core.c:72 (discriminator 1))<br />
__flush_smp_call_function_queue (./arch/x86/include/asm/jump_label.h:27<br />
./include/linux/jump_label.h:207 ./include/trace/events/csd.h:64<br />
kernel/smp.c:135 kernel/smp.c:540)<br />
__sysvec_call_function_single (./arch/x86/include/asm/jump_label.h:27<br />
./include/linux/jump_label.h:207<br />
./arch/x86/include/asm/trace/irq_vectors.h:99 arch/x86/kernel/smp.c:272)<br />
sysvec_call_function_single (arch/x86/kernel/smp.c:266 (discriminator 47)<br />
arch/x86/kernel/smp.c:266 (discriminator 47))<br />
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/43c2e5c2acaae50e99d1c20a5a46e367c442fb3b
- https://git.kernel.org/stable/c/49324a0c40f7e9bae1bd0362d23fc42232e14621
- https://git.kernel.org/stable/c/6e41d9ec8d7cc3f01b9ba785e05f0ebef8b3b37f
- https://git.kernel.org/stable/c/866cf36bfee4fba6a492d2dcc5133f857e3446b0
- https://git.kernel.org/stable/c/e1028fb38b328084bc683a4efb001c95d3108573



