A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Enterprise Linux Subscribe
Logging Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-15992 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
Ubuntu USN Ubuntu USN USN-6606-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6607-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6608-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6608-2 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-2 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6635-1 Linux kernel (GCP) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

In order to trigger the issue, it requires the ability to create user/net namespaces. On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.

History

Sun, 24 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T20:51:53.548Z

Reserved: 2024-01-02T10:58:11.805Z

Link: CVE-2024-0193

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:16.221Z

cve-icon NVD

Status : Modified

Published: 2024-01-02T18:15:08.287

Modified: 2024-11-21T08:46:02.133

Link: CVE-2024-0193

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-02T00:00:00Z

Links: CVE-2024-0193 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses