CVE-2025-68375
NULL Pointer Dereference in Linux perf Event Handling Causes PEBS Data Loss
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a NULL pointer access and potential loss of PEBS (Precise Event-Based Sampling) records during performance event processing. Specifically, when the function intel_pmu_drain_pebs_icl() calls perf_event_overflow() to process the last PEBS record, an interrupt throttle can be triggered that stops all events in the group and clears their pointers to NULL. Subsequently, the code attempts to access these now NULL pointers, causing a NULL pointer dereference. The fix involves moving the clearing of event pointers from the stop function to the delete function to prevent accessing NULL pointers.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to attempt to access NULL pointers during performance event processing, which may lead to kernel crashes or instability. This can affect system reliability and performance monitoring accuracy, potentially disrupting applications or services relying on these kernel features.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix involves moving the clearing of cpuc->events[] from x86_pmu_stop() to x86_pmu_del(), preventing NULL pointer access during PEBS event processing. Applying the latest kernel patches that include this fix will address the issue.