Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-43870— perf: Fix event leak upon exit

EPSS 0.01% · P2

Affected Version Matrix 13

VendorProductVersion RangeStatus
LinuxLinux8bffa95ac19ff27c8261904f89d36c7fcf215d59< 67fad724f1b568b356c1065d50df46e6b30eb2f7affected
517e6a301f34613bff24a8e35b5455884f2d83d8< 70882d7fa74f0731492a0d493e8515a4f7131831affected
517e6a301f34613bff24a8e35b5455884f2d83d8< 05d3fd599594abf79aad4484bccb2b26e1cb0b51affected
517e6a301f34613bff24a8e35b5455884f2d83d8< 3d7a63352a93bdb8a1cdf29606bf617d3ac1c22aaffected
517e6a301f34613bff24a8e35b5455884f2d83d8< 2fd5ad3f310de22836cdacae919dd99d758a1f1baffected
78e1317a174edbfd1182599bf76c092a2877672caffected
6.1affected
< 6.1unaffected
… +5 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-43870

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
perf: Fix event leak upon exit
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: perf: Fix event leak upon exit When a task is scheduled out, pending sigtrap deliveries are deferred to the target task upon resume to userspace via task_work. However failures while adding an event's callback to the task_work engine are ignored. And since the last call for events exit happen after task work is eventually closed, there is a small window during which pending sigtrap can be queued though ignored, leaking the event refcount addition such as in the following scenario: TASK A ----- do_exit() exit_task_work(tsk); <IRQ> perf_event_overflow() event->pending_sigtrap = pending_id; irq_work_queue(&event->pending_irq); </IRQ> =========> PREEMPTION: TASK A -> TASK B event_sched_out() event->pending_sigtrap = 0; atomic_long_inc_not_zero(&event->refcount) // FAILS: task work has exited task_work_add(&event->pending_task) [...] <IRQ WORK> perf_pending_irq() // early return: event->oncpu = -1 </IRQ WORK> [...] =========> TASK B -> TASK A perf_event_exit_task(tsk) perf_event_exit_event() free_event() WARN(atomic_long_cmpxchg(&event->refcount, 1, 0) != 1) // leak event due to unexpected refcount == 2 As a result the event is never released while the task exits. Fix this with appropriate task_work_add()'s error handling.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于 perf 子系统存在事件泄漏问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 8bffa95ac19ff27c8261904f89d36c7fcf215d59 ~ 67fad724f1b568b356c1065d50df46e6b30eb2f7 -
LinuxLinux 6.1 -

II. Public POCs for CVE-2024-43870

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-43870

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-21 · 69 CVEs total

CVE-2022-48877f2fs: let's avoid panic if extent_tree is not created
CVE-2024-43875PCI: endpoint: Clean up error handling in vpci_scan_bus()
CVE-2024-43874crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
CVE-2024-43876PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()
CVE-2022-48871tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer
CVE-2022-48872misc: fastrpc: Fix use-after-free race condition for maps
CVE-2022-48873misc: fastrpc: Don't remove map on creater_process and device_release
CVE-2022-48874misc: fastrpc: Fix use-after-free and race in fastrpc_map_find
CVE-2022-48875wifi: mac80211: sdata can be NULL during AMPDU start
CVE-2022-48876wifi: mac80211: fix initialization of rx->link and rx->link_sta
CVE-2022-48870tty: fix possible null-ptr-defer in spk_ttyio_release
CVE-2022-48878Bluetooth: hci_qca: Fix driver shutdown on closed serdev
CVE-2022-48879efi: fix NULL-deref in init error path
CVE-2022-48880platform/surface: aggregator: Add missing call to ssam_request_sync_free()
CVE-2022-48881platform/x86/amd: Fix refcount leak in amd_pmc_probe
CVE-2022-48882net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)
CVE-2022-48883net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent
CVE-2022-48884net/mlx5: Fix command stats access after free
CVE-2022-48885ice: Fix potential memory leak in ice_gnss_tty_write()
CVE-2022-48886ice: Add check for kzalloc

Showing top 20 of 69 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-43870

No comments yet


Leave a comment