CVE-2025-38424

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/07/2025
Last modified:
23/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> perf: Fix sample vs do_exit()<br /> <br /> Baisheng Gao reported an ARM64 crash, which Mark decoded as being a<br /> synchronous external abort -- most likely due to trying to access<br /> MMIO in bad ways.<br /> <br /> The crash further shows perf trying to do a user stack sample while in<br /> exit_mmap()&amp;#39;s tlb_finish_mmu() -- i.e. while tearing down the address<br /> space it is trying to access.<br /> <br /> It turns out that we stop perf after we tear down the userspace mm; a<br /> receipie for disaster, since perf likes to access userspace for<br /> various reasons.<br /> <br /> Flip this order by moving up where we stop perf in do_exit().<br /> <br /> Additionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER<br /> to abort when the current task does not have an mm (exit_mm() makes<br /> sure to set current-&gt;mm = NULL; before commencing with the actual<br /> teardown). Such that CPU wide events don&amp;#39;t trip on this same problem.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.7 (including) 5.4.295 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.239 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.186 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.142 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.95 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.35 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*