CVE-2023-6932

high

Description

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

References

https://www.cisa.gov/news-events/ics-advisories/icsa-24-102-01

https://cert-portal.siemens.com/productcert/html/ssa-265688.html

https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html

https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html

https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1

http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html

Details

Source: Mitre, NVD

Published: 2023-12-19

Updated: 2024-02-08

Risk Information

CVSS v2

Base Score: 6

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High