First published: Tue Apr 30 2024(Updated: )
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 F5OS | =1.7.0>=1.5.0<=1.5.2 | 1.8.0 |
F5 F5OS | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | 1.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000139430 is critical due to its potential for local privilege escalation.
To fix F5-K000139430, update to F5OS-A version 1.8.0 or F5OS-C version 1.8.0.
F5-K000139430 affects specific versions of F5OS-A and F5OS-C running earlier than the required remedy versions.
F5-K000139430 is a use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component.
F5-K000139430 is a local privilege escalation vulnerability and does not lead to remote exploitation.