CVE-2024-0193Use After Free in Redhat Enterprise Linux

CWE-416Use After Free19 documents8 sources
Severity
6.7MEDIUMNVD
CNA7.8
EPSS
0.1%
top 74.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 2
Latest updateApr 30

Description

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages1 packages

Debianlinux/linux_kernel< 5.10.205-1+3

Also affects: Enterprise Linux 9.0

Patches

🔴Vulnerability Details

3
CVEList
Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation2024-01-02
OSV
CVE-2024-0193: A use-after-free flaw was found in the netfilter subsystem of the Linux kernel2024-01-02
GHSA
GHSA-52x7-wcqq-wfjp: A use-after-free flaw was found in the netfilter subsystem of the Linux kernel2024-01-02

📋Vendor Advisories

14
Ubuntu
Kernel Live Patch Security Notice2024-04-30
Ubuntu
Kernel Live Patch Security Notice2024-03-12
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-02-15
Ubuntu
Linux kernel (NVIDIA) vulnerabilities2024-02-14
Ubuntu
Linux kernel (GCP) vulnerabilities2024-02-14

💬Community

1
Bugzilla
CVE-2024-0193 kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation2023-12-22
CVE-2024-0193 — Use After Free in Redhat | cvebase