CVE-2024-43870

5.5 MEDIUM

📋 TL;DR

A memory leak vulnerability in the Linux kernel's perf subsystem allows attackers to cause resource exhaustion by preventing proper cleanup of performance monitoring events during task exit. This affects all Linux systems using the perf subsystem, particularly those running untrusted code or workloads.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not specified in CVE; check kernel commit history for vulnerable versions before fixes
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires perf subsystem to be enabled/accessible; many distributions enable this by default for performance monitoring.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential privilege escalation through memory corruption side effects.

🟠

Likely Case

Local denial of service through gradual memory consumption, potentially causing system slowdowns or crashes over time.

🟢

If Mitigated

Minimal impact with proper resource limits and monitoring in place; isolated to individual processes.

🌐 Internet-Facing: LOW - Requires local access to exploit; not directly reachable from network.
🏢 Internal Only: MEDIUM - Local users or compromised processes can exploit this to degrade system performance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger perf events; timing-dependent race condition makes reliable exploitation challenging.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 05d3fd599594abf79aad4484bccb2b26e1cb0b51, 2fd5ad3f310de22836cdacae919dd99d758a1f1b, 3d7a63352a93bdb8a1cdf29606bf617d3ac1c22a, 67fad724f1b568b356c1065d50df46e6b30eb2f7, 70882d7fa74f0731492a0d493e8515a4f7131831

Vendor Advisory: https://git.kernel.org/stable/c/05d3fd599594abf79aad4484bccb2b26e1cb0b51

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable perf subsystem

linux

Prevents exploitation by disabling the vulnerable subsystem

echo 0 > /proc/sys/kernel/perf_event_paranoid
kernel.perf_event_paranoid=3 in /etc/sysctl.conf

Restrict perf access

linux

Limit which users can access perf events

sysctl -w kernel.perf_event_paranoid=2
chmod 750 /proc/sys/kernel/perf_event_paranoid

🧯 If You Can't Patch

  • Implement strict resource limits (ulimit, cgroups) to contain memory consumption
  • Monitor system memory usage and perf event counts for abnormal patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version against distribution security advisories; examine if perf events show abnormal refcounts during process exit

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits; test perf event cleanup during rapid process creation/termination

📡 Detection & Monitoring

Log Indicators:

  • Kernel warnings about event refcount mismatches
  • Abnormal memory consumption in /proc/meminfo
  • Perf subsystem errors in dmesg

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("perf_event" OR "event refcount" OR "WARN")

🔗 References

📤 Share & Export