![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-0193 |
Description: | A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-0193 RHBZ#2255653 https://bugzilla.redhat.com/show_bug.cgi?id=2255653 RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1018 RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1019 RHSA-2024:1248 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/security/cve/CVE-2024-0193 https://access.redhat.com/security/cve/CVE-2024-0193 |