CVE-2023-6932

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Feb 2025, 18:16

Type Values Removed Values Added
Summary (en) A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. (en) A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

21 Nov 2024, 08:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.0
v2 : unknown
v3 : 7.8
References () http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html - () http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 - Mailing List, Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 - Mailing List, Patch
References () https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 - Patch () https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html -
References () https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html - () https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html -

08 Feb 2024, 16:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html -

11 Jan 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html -

11 Jan 2024, 19:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html -

28 Dec 2023, 17:00

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
Summary
  • (es) Una vulnerabilidad de use after free en el componente ipv4: igmp del kernel de Linux se puede explotar para lograr una escalada de privilegios local. Se puede aprovechar una condición de ejecución para provocar que un temporizador se registre por error en un objeto bloqueado de lectura de RCU que es liberado por otro subproceso. Recomendamos actualizar el commit anterior e2b706c691905fe78468c361aaabc719d0a496f1.
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.0
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 - () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 - Mailing List, Patch
References () https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 - () https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

19 Dec 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-19 14:15

Updated : 2025-02-13 18:16


NVD link : CVE-2023-6932

Mitre link : CVE-2023-6932

CVE.ORG link : CVE-2023-6932


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free