{"id":"CVE-2023-6932","details":"A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.","modified":"2026-03-13T07:50:49.130106Z","published":"2023-12-19T14:15:08.460Z","related":["ALSA-2024:2394","SUSE-SU-2024:0110-1","SUSE-SU-2024:0112-1","SUSE-SU-2024:0113-1","SUSE-SU-2024:0115-1","SUSE-SU-2024:0117-1","SUSE-SU-2024:0118-1","SUSE-SU-2024:0120-1","SUSE-SU-2024:0129-1","SUSE-SU-2024:0141-1","SUSE-SU-2024:0153-1","SUSE-SU-2024:0154-1","SUSE-SU-2024:0156-1","SUSE-SU-2024:0160-1","SUSE-SU-2024:0331-1","SUSE-SU-2024:0339-1","SUSE-SU-2024:0344-1","SUSE-SU-2024:0347-1","SUSE-SU-2024:0348-1","SUSE-SU-2024:0351-1","SUSE-SU-2024:0352-1","SUSE-SU-2024:0358-1","SUSE-SU-2024:0362-1","SUSE-SU-2024:0373-1","SUSE-SU-2024:0376-1","SUSE-SU-2024:0378-1","SUSE-SU-2024:0380-1","SUSE-SU-2024:0389-1","SUSE-SU-2024:0393-1","SUSE-SU-2024:0395-1","SUSE-SU-2024:0409-1","SUSE-SU-2024:0411-1","SUSE-SU-2024:0414-1","SUSE-SU-2024:0418-1","SUSE-SU-2024:0421-1","SUSE-SU-2024:0428-1","SUSE-SU-2024:0429-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html"},{"type":"FIX","url":"https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"fixed":"4.14.332"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.301"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.263"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.203"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.142"}]},{"events":[{"introduced":"5.16"},{"fixed":"6.1.66"}]},{"events":[{"introduced":"6.2"},{"fixed":"6.6.5"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6932.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}