CVE-2025-38565

In the Linux kernel, the following vulnerability has been resolved: perf/core: Exit early on perf_mmap() fail When perf_mmap() fails to allocate a buffer, it still invokes the event_mapped() callback of the related event. On X86 this might increase the perf_rdpmc_allowed reference counter. But nothing undoes this as perf_mmap_close() is never called in this case, which causes another reference count leak. Return early on failure to prevent that.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 21:07

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0 - () https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0 - Patch
References () https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92 - () https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92 - Patch
References () https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd - () https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd - Patch
References () https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839 - () https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839 - Patch
References () https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650 - () https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650 - Patch
References () https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9 - () https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9 - Patch
References () https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b - () https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b - Patch
References () https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9 - () https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9 - Patch
References () https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432 - () https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839 -
  • () https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b -
  • () https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9 -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/core: Salida anticipada en caso de fallo de perf_mmap(). Cuando perf_mmap() no asigna un búfer, sigue invocando la devolución de llamada event_mapped() del evento relacionado. En X86, esto podría aumentar el contador de referencias perf_rdpmc_allowed. Sin embargo, esto no se puede revertir, ya que perf_mmap_close() nunca se llama en este caso, lo que provoca otra fuga del recuento de referencias. Para evitarlo, se debe regresar anticipadamente en caso de fallo.

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-08 21:07


NVD link : CVE-2025-38565

Mitre link : CVE-2025-38565

CVE.ORG link : CVE-2025-38565


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel