CVE-2025-38563
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
perf/core: Prevent VMA split of buffer mappings<br />
<br />
The perf mmap code is careful about mmap()&#39;ing the user page with the<br />
ringbuffer and additionally the auxiliary buffer, when the event supports<br />
it. Once the first mapping is established, subsequent mapping have to use<br />
the same offset and the same size in both cases. The reference counting for<br />
the ringbuffer and the auxiliary buffer depends on this being correct.<br />
<br />
Though perf does not prevent that a related mapping is split via mmap(2),<br />
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,<br />
which take reference counts, but then the subsequent perf_mmap_close()<br />
calls are not longer fulfilling the offset and size checks. This leads to<br />
reference count leaks.<br />
<br />
As perf already has the requirement for subsequent mappings to match the<br />
initial mapping, the obvious consequence is that VMA splits, caused by<br />
resizing of a mapping or partial unmapping, have to be prevented.<br />
<br />
Implement the vm_operations_struct::may_split() callback and return<br />
unconditionally -EINVAL.<br />
<br />
That ensures that the mapping offsets and sizes cannot be changed after the<br />
fact. Remapping to a different fixed address with the same size is still<br />
possible as it takes the references for the new mapping and drops those of<br />
the old mapping.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.1 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3bd518cc7ea61076bcd725e36ff0e690754977c0
- https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb
- https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121
- https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b
- https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6
- https://git.kernel.org/stable/c/d52451a9210f2e5a079ba052918c93563518a9ff
- https://git.kernel.org/stable/c/e4346ffec2c44d6b0be834d59b20632b5bb5729e
- https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f
- https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd
- https://www.zerodayinitiative.com/advisories/ZDI-25-873/
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



