A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.
A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.
We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.
We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3710-1 | linux security update |
Debian DLA |
DLA-3711-1 | linux-5.10 security update |
Debian DSA |
DSA-5594-1 | linux security update |
EUVD |
EUVD-2023-59130 | A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. |
Ubuntu USN |
USN-6601-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-6602-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6603-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6604-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6604-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6605-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6605-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-6607-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-6608-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6608-2 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6609-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6609-2 | Linux kernel (NVIDIA) vulnerabilities |
Ubuntu USN |
USN-6609-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-6628-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6628-2 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6635-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6639-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Debian
Debian debian Linux |
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. | A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T17:27:00.208Z
Reserved: 2023-12-18T20:14:26.281Z
Link: CVE-2023-6932
No data.
Status : Analyzed
Published: 2023-12-19T14:15:08.460
Modified: 2025-11-25T17:29:00.720
Link: CVE-2023-6932
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN