๐Ÿ” CVE Alert

CVE-2023-6932

HIGH 7.8

Use-after-free in Linux kernel's ipv4: igmp component

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.

CWE CWE-416
Vendor linux
Product kernel
Ecosystems
Industries
Technology
Published Dec 19, 2023
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for linux kernel

Be the first to know when new high vulnerabilities affecting linux kernel are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Linux / Kernel
2.6.12 < 6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 kernel.dance: https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html packetstormsecurity.com: http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html