A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
References
Configurations
History
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2024:1018 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1019 - | |
References | () https://access.redhat.com/errata/RHSA-2024:1248 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2094 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4412 - | |
References | () https://access.redhat.com/errata/RHSA-2024:4415 - | |
References | () https://access.redhat.com/security/cve/CVE-2024-0193 - Mitigation, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255653 - Issue Tracking, Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Mar 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jan 2024, 18:09
Type | Values Removed | Values Added |
---|---|---|
Summary | (es) Se encontró un fallo de use after free en el subsistema netfilter del kernel de Linux. Si el elemento general se recolecta como basura cuando se retira el conjunto de pipapo, el elemento se puede desactivar dos veces. Esto puede causar un problema de use-after-free en un objeto NFT_CHAIN o NFT_OBJECT, lo que permite a un usuario local sin privilegios escalar sus privilegios en el sistema. | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
References | () https://access.redhat.com/security/cve/CVE-2024-0193 - Mitigation, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2255653 - Issue Tracking, Patch, Third Party Advisory | |
First Time |
Linux linux Kernel
Redhat enterprise Linux Redhat Linux |
|
CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
03 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system. |
02 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-02 18:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0193
Mitre link : CVE-2024-0193
CVE.ORG link : CVE-2024-0193
JSON object : View
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free