In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init
Move the get_ctx(child_ctx) call and the child_event->ctx assignment to
occur immediately after the child event is allocated. Ensure that
child_event->ctx is non-NULL before any subsequent error path within
inherit_event calls free_event(), satisfying the assumptions of the
cleanup code.
Details:
There's no clear Fixes tag, because this bug is a side-effect of
multiple interacting commits over time (up to 15 years old), not
a single regression.
The code initially incremented refcount then assigned context
immediately after the child_event was created. Later, an early
validity check for child_event was added before the
refcount/assignment. Even later, a WARN_ON_ONCE() cleanup check was
added, assuming event->ctx is valid if the pmu_ctx is valid.
The problem is that the WARN_ON_ONCE() could trigger after the initial
check passed but before child_event->ctx was assigned, violating its
precondition. The solution is to assign child_event->ctx right after
its initial validation. This ensures the context exists for any
subsequent checks or cleanup routines, resolving the WARN_ON_ONCE().
To resolve it, defer the refcount update and child_event->ctx assignment
directly after child_event->pmu_ctx is set but before checking if the
parent event is orphaned. The cleanup routine depends on
event->pmu_ctx being non-NULL before it verifies event->ctx is
non-NULL. This also maintains the author's original intent of passing
in child_ctx to find_get_pmu_context before its refcount/assignment.
[ mingo: Expanded the changelog from another email by Gabriel Shahrouzi. ]
References
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | CWE-617 | |
| References | () https://git.kernel.org/stable/c/0ba3a4ab76fd3367b9cb680cad70182c896c795c - Patch | |
| References | () https://git.kernel.org/stable/c/1fe9b92eede32574dbe05b5bdb6ad666b350bed0 - Patch | |
| References | () https://git.kernel.org/stable/c/90dc6c1e3b200812da8d0aa030e1b7fda8226d0e - Patch | |
| References | () https://git.kernel.org/stable/c/cb56cd11feabf99e08bc18960700a53322ffcea7 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
12 May 2025, 17:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-09 07:16
Updated : 2025-11-12 19:53
NVD link : CVE-2025-37878
Mitre link : CVE-2025-37878
CVE.ORG link : CVE-2025-37878
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-617
Reachable Assertion
