CVE-2023-6932
Use-after-free in Linux kernel's ipv4: igmp component
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
| CWE | CWE-416 |
| Vendor | linux |
| Product | kernel |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 19, 2023 |
| Last Updated | Feb 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux kernel
Be the first to know when new high vulnerabilities affecting linux kernel are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Linux / Kernel
2.6.12 < 6.7
References
git.kernel.org: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 kernel.dance: https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html packetstormsecurity.com: http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html