Description
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
Published: 2024-01-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

In order to trigger the issue, it requires the ability to create user/net namespaces. On non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-15992 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
Ubuntu USN Ubuntu USN USN-6606-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6607-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6608-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6608-2 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-2 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-6609-3 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6628-2 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6635-1 Linux kernel (GCP) vulnerabilities
History

Fri, 15 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat codeready Linux Builder For Arm64
Redhat codeready Linux Builder For Arm64 Eus
Redhat codeready Linux Builder For Ibm Z Systems
Redhat codeready Linux Builder For Ibm Z Systems Eus
Redhat codeready Linux Builder For Power Little Endian
Redhat codeready Linux Builder For Power Little Endian Eus
Redhat codeready Linux Builder For X86 64 Eus
Redhat enterprise Linux For Arm64
Redhat enterprise Linux For Arm64 Els
Redhat enterprise Linux For Arm 64
Redhat enterprise Linux For Arm 64 Els
Redhat enterprise Linux For Arm 64 Eus
Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux For Ibm Z Systems Els
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat enterprise Linux For Power Little Endian Els
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux For X86 64
Redhat enterprise Linux For X86 64 Els
Redhat enterprise Linux For X86 64 Eus
Redhat enterprise Linux For X86 64 Update Services For Sap Solutions
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Redhat logging Subsystem For Red Hat Openshift
Redhat logging Subsystem For Red Hat Openshift For Arm 64
Redhat logging Subsystem For Red Hat Openshift For Ibm Power Little Endian
Redhat logging Subsystem For Red Hat Openshift For Ibm Z And Linuxone
CPEs cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.6_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_x86_64_eus:9.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift_for_arm_64:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift_for_ibm_power_little_endian:5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift_for_ibm_z_and_linuxone:5.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm64:9.2:*:*:*:*:*:aarch64:*
cpe:2.3:o:redhat:enterprise_linux_for_arm64_els:9.2:*:*:*:*:*:aarch64:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.6_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_els:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_els:9.6_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.6_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_els:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_els:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_els:9.6_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_els:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_els:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_els:9.6_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_els:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_els:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_els:9.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_eus:9.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_x86_64_update_services_for_sap_solutions:9.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.6_ppc64le:*:*:*:*:*:*:*
Vendors & Products Redhat codeready Linux Builder For Arm64
Redhat codeready Linux Builder For Arm64 Eus
Redhat codeready Linux Builder For Ibm Z Systems
Redhat codeready Linux Builder For Ibm Z Systems Eus
Redhat codeready Linux Builder For Power Little Endian
Redhat codeready Linux Builder For Power Little Endian Eus
Redhat codeready Linux Builder For X86 64 Eus
Redhat enterprise Linux For Arm64
Redhat enterprise Linux For Arm64 Els
Redhat enterprise Linux For Arm 64
Redhat enterprise Linux For Arm 64 Els
Redhat enterprise Linux For Arm 64 Eus
Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux For Ibm Z Systems Els
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat enterprise Linux For Power Little Endian Els
Redhat enterprise Linux For Power Little Endian Eus
Redhat enterprise Linux For X86 64
Redhat enterprise Linux For X86 64 Els
Redhat enterprise Linux For X86 64 Eus
Redhat enterprise Linux For X86 64 Update Services For Sap Solutions
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Redhat logging Subsystem For Red Hat Openshift
Redhat logging Subsystem For Red Hat Openshift For Arm 64
Redhat logging Subsystem For Red Hat Openshift For Ibm Power Little Endian
Redhat logging Subsystem For Red Hat Openshift For Ibm Z And Linuxone

Sun, 24 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Linux Linux Kernel
Redhat Codeready Linux Builder For Arm64 Codeready Linux Builder For Arm64 Eus Codeready Linux Builder For Ibm Z Systems Codeready Linux Builder For Ibm Z Systems Eus Codeready Linux Builder For Power Little Endian Codeready Linux Builder For Power Little Endian Eus Codeready Linux Builder For X86 64 Eus Enterprise Linux Enterprise Linux For Arm64 Enterprise Linux For Arm64 Els Enterprise Linux For Arm 64 Enterprise Linux For Arm 64 Els Enterprise Linux For Arm 64 Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Els Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Power Little Endian Els Enterprise Linux For Power Little Endian Eus Enterprise Linux For X86 64 Enterprise Linux For X86 64 Els Enterprise Linux For X86 64 Eus Enterprise Linux For X86 64 Update Services For Sap Solutions Enterprise Linux Server Aus Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Logging Logging Subsystem For Red Hat Openshift Logging Subsystem For Red Hat Openshift For Arm 64 Logging Subsystem For Red Hat Openshift For Ibm Power Little Endian Logging Subsystem For Red Hat Openshift For Ibm Z And Linuxone Rhel E4s Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-04T06:58:13.138Z

Reserved: 2024-01-02T10:58:11.805Z

Link: CVE-2024-0193

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:16.221Z

cve-icon NVD

Status : Analyzed

Published: 2024-01-02T18:15:08.287

Modified: 2026-05-15T17:45:36.930

Link: CVE-2024-0193

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-02T00:00:00Z

Links: CVE-2024-0193 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses