CVE-2024-43869

Source
https://cve.org/CVERecord?id=CVE-2024-43869
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43869.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43869
Downstream
Related
Published
2024-08-21T00:06:20.807Z
Modified
2026-03-11T05:20:47.962912Z
Summary
perf: Fix event leak upon exec and file release
Details

In the Linux kernel, the following vulnerability has been resolved:

perf: Fix event leak upon exec and file release

The perf pending task work is never waited upon the matching event release. In the case of a child event, released via free_event() directly, this can potentially result in a leaked event, such as in the following scenario that doesn't even require a weak IRQ work implementation to trigger:

schedule() preparetaskswitch() =======> <NMI> perfeventoverflow() event->pendingsigtrap = ... irqworkqueue(&event->pendingirq) <======= </NMI> perfeventtaskschedout() eventschedout() event->pendingsigtrap = 0; atomiclongincnotzero(&event->refcount) taskworkadd(&event->pendingtask) finishlockswitch() =======> <IRQ> perfpendingirq() //do nothing, rely on pending task work <======= </IRQ>

beginnewexec() perfeventexittask() perfeventexitevent() // If is child event freeevent() WARN(atomiclong_cmpxchg(&event->refcount, 1, 0) != 1) // event is leaked

Similar scenarios can also happen with perfeventremoveonexec() or simply against concurrent perfeventrelease().

Fix this with synchonizing against the possibly remaining pending task work while freeing the event, just like is done with remaining pending IRQ work. This means that the pending task callback neither need nor should hold a reference to the event, preventing it from ever beeing freed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43869.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8bffa95ac19ff27c8261904f89d36c7fcf215d59
Fixed
9ad46f1fef421d43cdab3a7d1744b2f43b54dae0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
517e6a301f34613bff24a8e35b5455884f2d83d8
Fixed
ed2c202dac55423a52d7e2290f2888bf08b8ee99
Fixed
104e258a004037bc7dba9f6085c71dad6af57ad4
Fixed
f34d8307a73a18de5320fcc6f40403146d061891
Fixed
3a5465418f5fd970e86a86c7f4075be262682840
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
78e1317a174edbfd1182599bf76c092a2877672c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43869.json"