{"id":"CVE-2024-0193","details":"A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.","modified":"2026-03-15T22:49:02.608128Z","published":"2024-01-02T18:15:08.287Z","related":["CGA-frjw-rq92-hrwh"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1018"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1019"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4415"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:1248"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4412"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-0193"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255653"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-0193.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}