CVE-2025-68798 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
6.4MEDIUM
No vectorEPSS
0.0%
top 88.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 13
Latest updateApr 17
Description
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/amd: Check event before enable to avoid GPF
On AMD machines cpuc->events[idx] can become NULL in a subtle race
condition with NMI->throttle->x86_pmu_stop().
Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.
This appears to be an AMD only issue.
Syzkaller reported a GPF in amd_pmu_enable_all.
INFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143
msecs
Oops: general protecti…
Affected Packages15 packages
▶CVEListV5linux/linuxada543459cab7f653dcacdaba4011a8bb19c627c — 49324a0c40f7e9bae1bd0362d23fc42232e14621+5
🔴Vulnerability Details
3GHSA▶
GHSA-v753-hw9q-p9vj: In the Linux kernel, the following vulnerability has been resolved:
perf/x86/amd: Check event before enable to avoid GPF
On AMD machines cpuc->event↗2026-01-13
OSV▶
CVE-2025-68798: In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: Check event before enable to avoid GPF On AMD machines cpuc->events[↗2026-01-13