CVE-2025-38564
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-28
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.14 (inc) to 6.15.10 (exc) |
| linux | linux_kernel | From 6.16 (inc) to 6.16.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's perf subsystem, specifically in the perf_mmap() function. When a buffer is allocated or attached, perf_mmap() tries to map it read-only into the page table. If this mapping fails, the function cleans up some page table entries but does not properly handle other side effects, such as updating reference counts and user memory accounting. This leads to leaked reference counts, corrupted user memory accounting, and unbalanced event mapping calls. The fix involves reordering calls so that on failure, cleanup functions are properly invoked to avoid these issues.
How can this vulnerability impact me? :
This vulnerability can cause resource leaks and corruption in the kernel's memory accounting related to performance monitoring buffers. Specifically, leaked reference counts and corrupted user memory accounting can lead to instability or unexpected behavior in the system. Additionally, unbalanced event mapping calls may cause further inconsistencies in performance event handling, potentially affecting system reliability or security.