Untriaged
Permalink
CVE-2024-0193
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @jopejoe1 Activity log
- Created automatic suggestion
-
@jopejoe1
removed
106 packages
- coq-kernel
- kernelshark
- linuxPackages.zfs_2_2
- linuxPackages.zfs_2_3
- kernel-hardening-checker
- linuxPackages.linux-gpib
- linuxPackages_lqx.zfs_2_3
- linuxPackages_zen.zfs_2_3
- python312Packages.kernels
- python313Packages.kernels
- linuxPackages.zfs_unstable
- linuxPackages-libre.zfs_2_2
- linuxPackages-libre.zfs_2_3
- python312Packages.ipykernel
- python313Packages.ipykernel
- linuxPackages_latest.zfs_2_3
- linuxPackages_lqx.linux-gpib
- linuxPackages_xanmod.zfs_2_2
- linuxPackages_xanmod.zfs_2_3
- linuxPackages_zen.linux-gpib
- python312Packages.metakernel
- python312Packages.nix-kernel
- python313Packages.metakernel
- python313Packages.nix-kernel
- python312Packages.bash-kernel
- python313Packages.bash-kernel
- haskellPackages.ipython-kernel
- linuxPackages-libre.linux-gpib
- linuxPackages_lqx.zfs_unstable
- linuxPackages_zen.zfs_unstable
- rocmPackages.composable_kernel
- linuxPackages_latest.linux-gpib
- linuxPackages_xanmod.linux-gpib
- gnomeExtensions.kernel-indicator
- linuxPackages-libre.zfs_unstable
- python312Packages.ansible-kernel
- python312Packages.spyder-kernels
- python313Packages.ansible-kernel
- python313Packages.spyder-kernels
- rocmPackages_6.composable_kernel
- linuxPackages_latest.zfs_unstable
- linuxPackages_xanmod.zfs_unstable
- linuxPackages_latest-libre.zfs_2_3
- python312Packages.jupyter-c-kernel
- python313Packages.jupyter-c-kernel
- linuxPackages_xanmod_stable.zfs_2_3
- linuxPackages_latest-libre.linux-gpib
- linuxKernel.packages.linux_5_4.zfs_2_2
- linuxKernel.packages.linux_5_4.zfs_2_3
- linuxKernel.packages.linux_6_1.zfs_2_2
- linuxKernel.packages.linux_6_1.zfs_2_3
- linuxKernel.packages.linux_6_6.zfs_2_2
- linuxKernel.packages.linux_6_6.zfs_2_3
- linuxKernel.packages.linux_lqx.zfs_2_3
- linuxKernel.packages.linux_zen.zfs_2_3
- linuxPackages_xanmod_stable.linux-gpib
- linuxKernel.packages.linux_5_10.zfs_2_2
- linuxKernel.packages.linux_5_10.zfs_2_3
- linuxKernel.packages.linux_5_15.zfs_2_2
- linuxKernel.packages.linux_5_15.zfs_2_3
- linuxKernel.packages.linux_6_12.zfs_2_2
- linuxKernel.packages.linux_6_12.zfs_2_3
- linuxKernel.packages.linux_6_16.zfs_2_3
- linuxPackages_latest-libre.zfs_unstable
- linuxKernel.packages.linux_libre.zfs_2_2
- linuxKernel.packages.linux_libre.zfs_2_3
- linuxPackages_xanmod_stable.zfs_unstable
- home-assistant-component-tests.hardkernel
- linuxKernel.packages.linux_5_4.linux-gpib
- linuxKernel.packages.linux_6_1.linux-gpib
- linuxKernel.packages.linux_6_6.linux-gpib
- linuxKernel.packages.linux_lqx.linux-gpib
- linuxKernel.packages.linux_xanmod.zfs_2_2
- linuxKernel.packages.linux_xanmod.zfs_2_3
- linuxKernel.packages.linux_zen.linux-gpib
- linuxKernel.packages.linux_5_10.linux-gpib
- linuxKernel.packages.linux_5_15.linux-gpib
- linuxKernel.packages.linux_6_12.linux-gpib
- linuxKernel.packages.linux_6_16.linux-gpib
- linuxKernel.packages.linux_5_4.zfs_unstable
- linuxKernel.packages.linux_6_1.zfs_unstable
- linuxKernel.packages.linux_6_6.zfs_unstable
- linuxKernel.packages.linux_hardened.zfs_2_2
- linuxKernel.packages.linux_hardened.zfs_2_3
- linuxKernel.packages.linux_libre.linux-gpib
- linuxKernel.packages.linux_lqx.zfs_unstable
- linuxKernel.packages.linux_zen.zfs_unstable
- linuxKernel.packages.linux_5_10.zfs_unstable
- linuxKernel.packages.linux_5_15.zfs_unstable
- linuxKernel.packages.linux_6_12.zfs_unstable
- linuxKernel.packages.linux_6_16.zfs_unstable
- linuxKernel.packages.linux_xanmod.linux-gpib
- linuxKernel.packages.linux_libre.zfs_unstable
- linuxKernel.packages.linux_hardened.linux-gpib
- linuxKernel.packages.linux_xanmod.zfs_unstable
- linuxKernel.packages.linux_latest_libre.zfs_2_3
- linuxKernel.packages.linux_6_12_hardened.zfs_2_2
- linuxKernel.packages.linux_6_12_hardened.zfs_2_3
- linuxKernel.packages.linux_hardened.zfs_unstable
- linuxKernel.packages.linux_xanmod_stable.zfs_2_3
- linuxKernel.packages.linux_latest_libre.linux-gpib
- linuxKernel.packages.linux_6_12_hardened.linux-gpib
- linuxKernel.packages.linux_xanmod_stable.linux-gpib
- linuxKernel.packages.linux_latest_libre.zfs_unstable
- linuxKernel.packages.linux_6_12_hardened.zfs_unstable
- linuxKernel.packages.linux_xanmod_stable.zfs_unstable
Kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user to escalate their privileges on the system.
References
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry
- RHBZ#2255653 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-0193 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2255653 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:1018 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1019 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:1248 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2094 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4412 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:4415 x_refsource_REDHAT vendor-advisory x_transferred
Affected products
kernel
- *
kernel-rt
- *
openshift-logging/vector-rhel9
- *
openshift-logging/fluentd-rhel9
- *
openshift-logging/eventrouter-rhel9
- *
openshift-logging/logging-loki-rhel9
- *
openshift-logging/loki-rhel9-operator
- *
openshift-logging/opa-openshift-rhel9
- *
openshift-logging/elasticsearch6-rhel9
- *
openshift-logging/loki-operator-bundle
- *
openshift-logging/logging-curator5-rhel9
- *
openshift-logging/lokistack-gateway-rhel9
- *
openshift-logging/elasticsearch-proxy-rhel9
- *
openshift-logging/logging-view-plugin-rhel9
- *
openshift-logging/elasticsearch-rhel9-operator
- *
openshift-logging/elasticsearch-operator-bundle
- *
openshift-logging/cluster-logging-rhel9-operator
- *
openshift-logging/log-file-metric-exporter-rhel9
- *
openshift-logging/cluster-logging-operator-bundle
- *
Package maintainers
-
@Sigmanificient Yohann Boniface <sigmanificient@gmail.com>