CVE-2025-38563
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's perf subsystem involves improper handling of virtual memory area (VMA) splits in buffer mappings. The perf mmap code requires that subsequent memory mappings use the same offset and size as the initial mapping to maintain correct reference counting for ringbuffer and auxiliary buffers. However, VMA splits caused by operations like mmap, munmap, or mremap can lead to reference count leaks because the checks on offset and size are bypassed during perf_mmap_close calls. The fix prevents VMA splits by implementing a callback that disallows splitting, ensuring mapping offsets and sizes remain consistent.
How can this vulnerability impact me? :
This vulnerability can lead to reference count leaks in the perf subsystem of the Linux kernel. Such leaks may cause resource management issues, potentially leading to increased memory usage or instability in systems relying on perf for performance monitoring. Over time, this could degrade system performance or cause unexpected behavior due to improper handling of buffer mappings.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the perf/core vulnerability has been fixed. The fix involves implementing the vm_operations_struct::may_split() callback to prevent VMA splits by returning -EINVAL, ensuring mapping offsets and sizes cannot be changed after the fact. Avoid resizing or partially unmapping perf mmap buffers until the patch is applied.