<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2024-0193 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0193/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Tue, 21 Apr 2026 16:44:30 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2024-0193</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0193/#post-699</link>
                        <pubDate>Tue, 22 Oct 2024 18:31:59 +0000</pubDate>
                        <description><![CDATA[Description
A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be d...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description</strong></p>
<p><span>A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.</span></p>
<p><strong>References</strong></p>
<ul>
<li><a href="https://cve.mitre.org/cgi-bin/RHBZ#2255653" target="_blank" rel="noopener">MISC:RHBZ#2255653</a></li>
<li><a href="https://bugzilla.redhat.com/show_bug.cgi?id=2255653" target="_blank" rel="noopener">URL:https://bugzilla.redhat.com/show_bug.cgi?id=2255653</a></li>
<li><a href="1018" target="_blank" rel="noopener">MISC:RHSA-2024:1018</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:1018" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:1018</a></li>
<li><a href="1019" target="_blank" rel="noopener">MISC:RHSA-2024:1019</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:1019" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:1019</a></li>
<li><a href="1248" target="_blank" rel="noopener">MISC:RHSA-2024:1248</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:1248" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:1248</a></li>
<li><a href="2094" target="_blank" rel="noopener">MISC:RHSA-2024:2094</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:2094" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:2094</a></li>
<li><a href="4412" target="_blank" rel="noopener">MISC:RHSA-2024:4412</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:4412" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:4412</a></li>
<li><a href="4415" target="_blank" rel="noopener">MISC:RHSA-2024:4415</a></li>
<li><a href="https://access.redhat.com/errata/RHSA-2024:4415" target="_blank" rel="noopener">URL:https://access.redhat.com/errata/RHSA-2024:4415</a></li>
<li><a href="https://access.redhat.com/security/cve/CVE-2024-0193" target="_blank" rel="noopener">MISC:https://access.redhat.com/security/cve/CVE-2024-0193</a></li>
<li><a href="https://access.redhat.com/security/cve/CVE-2024-0193" target="_blank" rel="noopener">URL:https://access.redhat.com/security/cve/CVE-2024-0193</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>worldlovely</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2024-0193/#post-699</guid>
                    </item>
							        </channel>
        </rss>
		