{"id":"CVE-2025-38565","summary":"perf/core: Exit early on perf_mmap() fail","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Exit early on perf_mmap() fail\n\nWhen perf_mmap() fails to allocate a buffer, it still invokes the\nevent_mapped() callback of the related event. On X86 this might increase\nthe perf_rdpmc_allowed reference counter. But nothing undoes this as\nperf_mmap_close() is never called in this case, which causes another\nreference count leak.\n\nReturn early on failure to prevent that.","modified":"2026-04-16T04:32:01.767724803Z","published":"2025-08-19T17:02:41.700Z","related":["SUSE-SU-2025:03204-1","SUSE-SU-2025:03272-1","SUSE-SU-2025:03290-1","SUSE-SU-2025:03301-1","SUSE-SU-2025:03382-1","SUSE-SU-2025:03602-1","SUSE-SU-2025:03633-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20653-1","SUSE-SU-2025:20669-1","SUSE-SU-2025:20739-1","SUSE-SU-2025:20756-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","SUSE-SU-2026:0474-1","SUSE-SU-2026:0475-1","SUSE-SU-2026:0495-1","SUSE-SU-2026:0496-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:1131-1","openSUSE-SU-2025:20081-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38565.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92"},{"type":"WEB","url":"https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38565.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38565"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb"},{"fixed":"5ffda7f3ed76ec8defc19d985e33b3b82ba07839"},{"fixed":"9b90a48c7de828a15c7a4fc565d46999c6e22d6b"},{"fixed":"de85e72598d89880a02170a1cbc27b35a7d978a9"},{"fixed":"27d44145bd576bbef9bf6165bcd78128ec3e6cbd"},{"fixed":"f41e9eba77bf97626e04296dc5677d02816d2432"},{"fixed":"92043120a2e992800580855498ab8507e1b22db9"},{"fixed":"163b0d1a209fe0df5476c1df2330ca12b55abf92"},{"fixed":"7ff8521f30c4c2fcd4e88bd7640486602bf8a650"},{"fixed":"07091aade394f690e7b655578140ef84d0e8d7b0"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38565.json"}}],"schema_version":"1.7.5"}