A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-01
https://cert-portal.siemens.com/productcert/html/ssa-265688.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html