First published: Tue Dec 19 2023(Updated: )
A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread. We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<6.7 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 6.12.25-1 |
If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-6932 is considered to have a high severity due to its potential for local privilege escalation.
To fix CVE-2023-6932, users should update their Linux kernel to a version that is not vulnerable, such as 5.10.223-1, 5.10.226-1, or later versions.
CVE-2023-6932 affects Linux kernel versions from 2.6.12 up to, but not including, 6.7.
Yes, IBM QRadar SIEM versions up to 7.5.0 UP8 IF01 are affected by CVE-2023-6932.
CVE-2023-6932 is a use-after-free vulnerability found in the Linux kernel's ipv4: igmp component.