CVE-2024-43870

Source
https://cve.org/CVERecord?id=CVE-2024-43870
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43870.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43870
Downstream
Related
Published
2024-08-21T00:06:21.878Z
Modified
2026-03-20T12:37:46.068939Z
Summary
perf: Fix event leak upon exit
Details

In the Linux kernel, the following vulnerability has been resolved:

perf: Fix event leak upon exit

When a task is scheduled out, pending sigtrap deliveries are deferred to the target task upon resume to userspace via task_work.

However failures while adding an event's callback to the task_work engine are ignored. And since the last call for events exit happen after task work is eventually closed, there is a small window during which pending sigtrap can be queued though ignored, leaking the event refcount addition such as in the following scenario:

TASK A
-----

do_exit()
   exit_task_work(tsk);

   <IRQ>
   perf_event_overflow()
      event->pending_sigtrap = pending_id;
      irq_work_queue(&event->pending_irq);
   </IRQ>
=========> PREEMPTION: TASK A -> TASK B
   event_sched_out()
      event->pending_sigtrap = 0;
      atomic_long_inc_not_zero(&event->refcount)
      // FAILS: task work has exited
      task_work_add(&event->pending_task)
   [...]
   &lt;IRQ WORK>
   perf_pending_irq()
      // early return: event->oncpu = -1
   &lt;/IRQ WORK>
   [...]
=========> TASK B -> TASK A
   perf_event_exit_task(tsk)
      perf_event_exit_event()
         free_event()
            WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1)
            // leak event due to unexpected refcount == 2

As a result the event is never released while the task exits.

Fix this with appropriate taskworkadd()'s error handling.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43870.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8bffa95ac19ff27c8261904f89d36c7fcf215d59
Fixed
67fad724f1b568b356c1065d50df46e6b30eb2f7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
517e6a301f34613bff24a8e35b5455884f2d83d8
Fixed
70882d7fa74f0731492a0d493e8515a4f7131831
Fixed
05d3fd599594abf79aad4484bccb2b26e1cb0b51
Fixed
3d7a63352a93bdb8a1cdf29606bf617d3ac1c22a
Fixed
2fd5ad3f310de22836cdacae919dd99d758a1f1b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
78e1317a174edbfd1182599bf76c092a2877672c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43870.json"