In the Linux kernel, the following vulnerability has been resolved:
freezer,umh: Fix callusermodehelper_exec() vs SIGKILL
Tetsuo-San noted that commit f5d39b020809 ("freezer,sched: Rewrite core freezer logic") broke callusermodehelperexec() for the KILLABLE case.
Specifically it was missed that the second, unconditional, waitforcompletion() was not optional and ensures the on-stack completion is unused before going out-of-scope.
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f9f6c54da876b3f0bece2b569456ceb96965ed7",
"digest": {
"line_hashes": [
"236723436722197098376982206779127060467",
"125080581720476382875189344521686763047",
"228044983507920151223161943833567898440",
"211989627945530989916419517264992291658",
"226686023544488491099600540233800173265",
"79766840984151799044049505667847143706",
"243720218427881366557219533618983500774",
"137801471938717817197457536775122330463",
"176395969858055213756320129294207844267",
"38571701403772258190043588330835320889",
"10931917793154705507730602786304854147",
"80435997024275651529408610005022972803",
"188487143935801815568191920614827919362",
"10931285486604610611335673890003562548"
],
"threshold": 0.9
},
"target": {
"file": "kernel/umh.c"
},
"id": "CVE-2023-52704-52fbc119",
"deprecated": false,
"signature_type": "Line"
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7f9f6c54da876b3f0bece2b569456ceb96965ed7",
"digest": {
"function_hash": "152382453830146804617012425823040391279",
"length": 862.0
},
"target": {
"function": "call_usermodehelper_exec",
"file": "kernel/umh.c"
},
"id": "CVE-2023-52704-c65b881e",
"deprecated": false,
"signature_type": "Function"
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d",
"digest": {
"line_hashes": [
"236723436722197098376982206779127060467",
"125080581720476382875189344521686763047",
"228044983507920151223161943833567898440",
"211989627945530989916419517264992291658",
"226686023544488491099600540233800173265",
"79766840984151799044049505667847143706",
"243720218427881366557219533618983500774",
"137801471938717817197457536775122330463",
"176395969858055213756320129294207844267",
"38571701403772258190043588330835320889",
"10931917793154705507730602786304854147",
"80435997024275651529408610005022972803",
"188487143935801815568191920614827919362",
"10931285486604610611335673890003562548"
],
"threshold": 0.9
},
"target": {
"file": "kernel/umh.c"
},
"id": "CVE-2023-52704-e04cb5f3",
"deprecated": false,
"signature_type": "Line"
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d",
"digest": {
"function_hash": "152382453830146804617012425823040391279",
"length": 862.0
},
"target": {
"function": "call_usermodehelper_exec",
"file": "kernel/umh.c"
},
"id": "CVE-2023-52704-f8b7ba0e",
"deprecated": false,
"signature_type": "Function"
}
]