-
CVE-2025-38565
- EPSS 0.05%
- Veröffentlicht 19.08.2025 17:15:33
- Zuletzt bearbeitet 28.08.2025 15:15:53
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: perf/core: Exit early on perf_mmap() fail When perf_mmap() fails to allocate a buffer, it still invokes the event_mapped() callback of the related event. On X86 this might increase the perf_rdpmc_allowed reference counter. But nothing undoes this as perf_mmap_close() is never called in this case, which causes another reference count leak. Return early on failure to prevent that.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
5ffda7f3ed76ec8defc19d985e33b3b82ba07839
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
9b90a48c7de828a15c7a4fc565d46999c6e22d6b
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
de85e72598d89880a02170a1cbc27b35a7d978a9
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
27d44145bd576bbef9bf6165bcd78128ec3e6cbd
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
f41e9eba77bf97626e04296dc5677d02816d2432
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
92043120a2e992800580855498ab8507e1b22db9
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
163b0d1a209fe0df5476c1df2330ca12b55abf92
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
7ff8521f30c4c2fcd4e88bd7640486602bf8a650
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
Version <
07091aade394f690e7b655578140ef84d0e8d7b0
Version
1e0fb9ec679c9273a641f1d6f3d25ea47baef2bb
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.0
Status
affected
Version <
4.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.142 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|