๐Ÿ” CVE Alert

CVE-2024-0193

HIGH 7.8

Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

CWE CWE-416
Published Jan 2, 2024
Last Updated Mar 4, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1018 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1019 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1248 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2094 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:4412 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:4415 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-0193 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2255653