2024-07-14 02:06:08 +00:00

29 lines
1.6 KiB
JSON

{
"id": "CVE-2023-52704",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T16:15:12.760",
"lastModified": "2024-05-21T16:53:56.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfreezer,umh: Fix call_usermode_helper_exec() vs SIGKILL\n\nTetsuo-San noted that commit f5d39b020809 (\"freezer,sched: Rewrite\ncore freezer logic\") broke call_usermodehelper_exec() for the KILLABLE\ncase.\n\nSpecifically it was missed that the second, unconditional,\nwait_for_completion() was not optional and ensures the on-stack\ncompletion is unused before going out-of-scope."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL .Tetsuo-San not\u00f3 que la confirmaci\u00f3n f5d39b020809 (\"freezer,sched: Rewrite core freezer logic\") rompi\u00f3 call_usermodehelper_exec() para el caso KILLABLE. Espec\u00edficamente, se pas\u00f3 por alto que el segundo wait_for_completion() incondicional no era opcional y garantiza que la finalizaci\u00f3n en la pila no se utilice antes de salir del alcance."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}