Lucene search

K
f5F5F5:K000139877
HistoryJun 03, 2024 - 12:00 a.m.

K000139877: Linux kernel vulnerabilities CVE-2021-47076 and CVE-2021-47080

2024-06-0300:00:00
my.f5.com
5
linux kernel
vulnerabilities
cve-2021-47076
cve-2021-47080
resolved
rdma/rxe
divide-by-zero

5.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

Security Advisory Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Return CQE error if invalid lkey was supplied RXE is missing update of WQE status in LOCAL_WRITE failures. This caused the following kernel panic if someone sent an atomic operation with an explicitly wrong lkey. [leonro@vm ~]$ mkt test test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) … WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe] Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu_._org 04/01/2014 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe] Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff <0f> 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff RSP: 0018:ffff8880158af090 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652 RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0xb11/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_responder+0x5532/0x7620 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_rcv+0x9c8/0x1df0 [rdma_rxe] rxe_loopback+0x157/0x1e0 [rdma_rxe] rxe_requester+0x1efd/0x58c0 [rdma_rxe] rxe_do_task+0x130/0x230 [rdma_rxe] rxe_post_send+0x998/0x1860 [rdma_rxe] ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs] ib_uverbs_write+0x847/0xc80 [ib_uverbs] vfs_write+0x1c5/0x840 ksys_write+0x176/0x1d0 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Prevent divide-by-zero error triggered by the user The user_entry_size is supplied by the user and later used as a denominator to calculate number of entries. The zero supplied by the user will trigger the following divide-by-zero error: divide error: 0000 [#1] SMP KASAN PTI CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu_._org 04/01/2014 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510 Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff <49> f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b RSP: 0018:ffff88810416f828 EFLAGS: 00010246 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000 RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0 FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0 ib_uverbs_cmd_verbs+0x1546/0x1940 ib_uverbs_ioctl+0x186/0x240 __x64_sys_ioctl+0x38a/0x1220 do_syscall_64+0x3f/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae

Impact

An attacker may be able to exploit this vulnerability by causing a kernel panic and denial-of-service (DoS).

Affected configurations

Vulners
Node
f5big-ip_nextMatch20.1.0
OR
f5big-ip_nextMatch20.1.1
OR
f5big-ip_nextMatch20.2.0
OR
f5big-ip_nextMatch1.1.0
OR
f5big-ip_nextMatch1.1.1
OR
f5big-ip_nextMatch1.2.0
OR
f5big-ip_nextMatch1.2.1
OR
f5big-ip_nextMatch1.3.0
OR
f5big-ip_nextMatch1.1.0
OR
f5big-ip_nextMatch1.1.1
OR
f5big-ip_nextMatch1.2.0
OR
f5big-ip_nextMatch1.2.1
OR
f5big-ip_nextMatch1.3.0
OR
f5big-ip_nextMatch1.1.0
OR
f5big-ip_nextMatch1.1.1
OR
f5big-ip_nextMatch1.2.0
OR
f5big-ip_nextMatch1.2.1
OR
f5big-ip_nextMatch1.3.0
OR
f5big-ip_ltmMatch20.1.0
OR
f5big-ip_ltmMatch20.2.0
OR
f5big-ip_nextMatch1.5.0
OR
f5big-ip_nextMatch1.6.0
OR
f5big-ip_nextMatch1.7.0
OR
f5big-ip_nextMatch1.7.1
OR
f5big-ip_nextMatch1.7.2
OR
f5big-ip_nextMatch1.7.3
OR
f5big-ip_nextMatch1.7.4
OR
f5big-ip_nextMatch1.7.5
OR
f5big-ip_nextMatch1.7.6
OR
f5big-ip_nextMatch1.7.7
OR
f5big-ip_nextMatch1.7.8
OR
f5big-ip_nextMatch1.8.0
OR
f5big-ip_nextMatch1.8.2
OR
f5big-ip_nextMatch1.9.0
OR
f5big-ip_nextMatch1.9.1
OR
f5big-ip_nextMatch20.1.0
OR
f5big-ip_nextMatch20.2.0
OR
f5big-ipMatch15.1.0
OR
f5big-ipMatch15.1.1
OR
f5big-ipMatch15.1.10
OR
f5big-ipMatch15.1.2
OR
f5big-ipMatch15.1.3
OR
f5big-ipMatch15.1.4
OR
f5big-ipMatch15.1.5
OR
f5big-ipMatch15.1.6
OR
f5big-ipMatch15.1.7
OR
f5big-ipMatch15.1.8
OR
f5big-ipMatch15.1.9
OR
f5big-ip_afmMatch15.1.0
OR
f5big-ip_afmMatch15.1.1
OR
f5big-ip_afmMatch15.1.10
OR
f5big-ip_afmMatch15.1.2
OR
f5big-ip_afmMatch15.1.3
OR
f5big-ip_afmMatch15.1.4
OR
f5big-ip_afmMatch15.1.5
OR
f5big-ip_afmMatch15.1.6
OR
f5big-ip_afmMatch15.1.7
OR
f5big-ip_afmMatch15.1.8
OR
f5big-ip_afmMatch15.1.9
OR
f5big-ip_afmMatch16.1.0
OR
f5big-ip_afmMatch16.1.1
OR
f5big-ip_afmMatch16.1.2
OR
f5big-ip_afmMatch16.1.3
OR
f5big-ip_afmMatch16.1.4
OR
f5big-ip_afmMatch17.1.0
OR
f5big-ip_afmMatch17.1.1
OR
f5big-ip_analyticsMatch15.1.0
OR
f5big-ip_analyticsMatch15.1.1
OR
f5big-ip_analyticsMatch15.1.10
OR
f5big-ip_analyticsMatch15.1.2
OR
f5big-ip_analyticsMatch15.1.3
OR
f5big-ip_analyticsMatch15.1.4
OR
f5big-ip_analyticsMatch15.1.5
OR
f5big-ip_analyticsMatch15.1.6
OR
f5big-ip_analyticsMatch15.1.7
OR
f5big-ip_analyticsMatch15.1.8
OR
f5big-ip_analyticsMatch15.1.9
OR
f5big-ip_analyticsMatch16.1.0
OR
f5big-ip_analyticsMatch16.1.1
OR
f5big-ip_analyticsMatch16.1.2
OR
f5big-ip_analyticsMatch16.1.3
OR
f5big-ip_analyticsMatch16.1.4
OR
f5big-ip_analyticsMatch17.1.0
OR
f5big-ip_analyticsMatch17.1.1
OR
f5big-ip_apmMatch15.1.0
OR
f5big-ip_apmMatch15.1.1
OR
f5big-ip_apmMatch15.1.10
OR
f5big-ip_apmMatch15.1.2
OR
f5big-ip_apmMatch15.1.3
OR
f5big-ip_apmMatch15.1.4
OR
f5big-ip_apmMatch15.1.5
OR
f5big-ip_apmMatch15.1.6
OR
f5big-ip_apmMatch15.1.7
OR
f5big-ip_apmMatch15.1.8
OR
f5big-ip_apmMatch15.1.9
OR
f5big-ip_apmMatch16.1.0
OR
f5big-ip_apmMatch16.1.1
OR
f5big-ip_apmMatch16.1.2
OR
f5big-ip_apmMatch16.1.3
OR
f5big-ip_apmMatch16.1.4
OR
f5big-ip_apmMatch17.1.0
OR
f5big-ip_apmMatch17.1.1
OR
f5big-ip_asmMatch15.1.0
OR
f5big-ip_asmMatch15.1.1
OR
f5big-ip_asmMatch15.1.10
OR
f5big-ip_asmMatch15.1.2
OR
f5big-ip_asmMatch15.1.3
OR
f5big-ip_asmMatch15.1.4
OR
f5big-ip_asmMatch15.1.5
OR
f5big-ip_asmMatch15.1.6
OR
f5big-ip_asmMatch15.1.7
OR
f5big-ip_asmMatch15.1.8
OR
f5big-ip_asmMatch15.1.9
OR
f5big-ip_asmMatch16.1.0
OR
f5big-ip_asmMatch16.1.1
OR
f5big-ip_asmMatch16.1.2
OR
f5big-ip_asmMatch16.1.3
OR
f5big-ip_asmMatch16.1.4
OR
f5big-ip_asmMatch17.1.0
OR
f5big-ip_asmMatch17.1.1
OR
f5big-ip_dnsMatch15.1.0
OR
f5big-ip_dnsMatch15.1.1
OR
f5big-ip_dnsMatch15.1.10
OR
f5big-ip_dnsMatch15.1.2
OR
f5big-ip_dnsMatch15.1.3
OR
f5big-ip_dnsMatch15.1.4
OR
f5big-ip_dnsMatch15.1.5
OR
f5big-ip_dnsMatch15.1.6
OR
f5big-ip_dnsMatch15.1.7
OR
f5big-ip_dnsMatch15.1.8
OR
f5big-ip_dnsMatch15.1.9
OR
f5big-ip_dnsMatch16.1.0
OR
f5big-ip_dnsMatch16.1.1
OR
f5big-ip_dnsMatch16.1.2
OR
f5big-ip_dnsMatch16.1.3
OR
f5big-ip_dnsMatch16.1.4
OR
f5big-ip_dnsMatch17.1.0
OR
f5big-ip_dnsMatch17.1.1
OR
f5big-ipMatch15.1.0
OR
f5big-ipMatch15.1.1
OR
f5big-ipMatch15.1.10
OR
f5big-ipMatch15.1.2
OR
f5big-ipMatch15.1.3
OR
f5big-ipMatch15.1.4
OR
f5big-ipMatch15.1.5
OR
f5big-ipMatch15.1.6
OR
f5big-ipMatch15.1.7
OR
f5big-ipMatch15.1.8
OR
f5big-ipMatch15.1.9
OR
f5big-ipMatch16.1.0
OR
f5big-ipMatch16.1.1
OR
f5big-ipMatch16.1.2
OR
f5big-ipMatch16.1.3
OR
f5big-ipMatch16.1.4
OR
f5big-ipMatch17.1.0
OR
f5big-ipMatch17.1.1
OR
f5big-ip_link_controllerMatch15.1.0
OR
f5big-ip_link_controllerMatch15.1.1
OR
f5big-ip_link_controllerMatch15.1.10
OR
f5big-ip_link_controllerMatch15.1.2
OR
f5big-ip_link_controllerMatch15.1.3
OR
f5big-ip_link_controllerMatch15.1.4
OR
f5big-ip_link_controllerMatch15.1.5
OR
f5big-ip_link_controllerMatch15.1.6
OR
f5big-ip_link_controllerMatch15.1.7
OR
f5big-ip_link_controllerMatch15.1.8
OR
f5big-ip_link_controllerMatch15.1.9
OR
f5big-ip_link_controllerMatch16.1.0
OR
f5big-ip_link_controllerMatch16.1.1
OR
f5big-ip_link_controllerMatch16.1.2
OR
f5big-ip_link_controllerMatch16.1.3
OR
f5big-ip_link_controllerMatch16.1.4
OR
f5big-ip_link_controllerMatch17.1.0
OR
f5big-ip_link_controllerMatch17.1.1
OR
f5big-ip_ltmMatch15.1.0
OR
f5big-ip_ltmMatch15.1.1
OR
f5big-ip_ltmMatch15.1.10
OR
f5big-ip_ltmMatch15.1.2
OR
f5big-ip_ltmMatch15.1.3
OR
f5big-ip_ltmMatch15.1.4
OR
f5big-ip_ltmMatch15.1.5
OR
f5big-ip_ltmMatch15.1.6
OR
f5big-ip_ltmMatch15.1.7
OR
f5big-ip_ltmMatch15.1.8
OR
f5big-ip_ltmMatch15.1.9
OR
f5big-ip_ltmMatch16.1.0
OR
f5big-ip_ltmMatch16.1.1
OR
f5big-ip_ltmMatch16.1.2
OR
f5big-ip_ltmMatch16.1.3
OR
f5big-ip_ltmMatch16.1.4
OR
f5big-ip_ltmMatch17.1.0
OR
f5big-ip_ltmMatch17.1.1
OR
f5big-ip_pemMatch15.1.0
OR
f5big-ip_pemMatch15.1.1
OR
f5big-ip_pemMatch15.1.10
OR
f5big-ip_pemMatch15.1.2
OR
f5big-ip_pemMatch15.1.3
OR
f5big-ip_pemMatch15.1.4
OR
f5big-ip_pemMatch15.1.5
OR
f5big-ip_pemMatch15.1.6
OR
f5big-ip_pemMatch15.1.7
OR
f5big-ip_pemMatch15.1.8
OR
f5big-ip_pemMatch15.1.9
OR
f5big-ip_pemMatch16.1.0
OR
f5big-ip_pemMatch16.1.1
OR
f5big-ip_pemMatch16.1.2
OR
f5big-ip_pemMatch16.1.3
OR
f5big-ip_pemMatch16.1.4
OR
f5big-ip_pemMatch17.1.0
OR
f5big-ip_pemMatch17.1.1
OR
f5nginx_agentMatch2.17.0
OR
f5nginx_agentMatch2.18.0
OR
f5nginx_agentMatch2.19.0
OR
f5nginx_agentMatch2.20.0
OR
f5nginx_agentMatch2.20.1
OR
f5nginx_agentMatch2.22.0
OR
f5nginx_agentMatch2.22.1
OR
f5nginx_agentMatch2.23.0
OR
f5nginx_agentMatch2.23.1
OR
f5nginx_agentMatch2.23.2
OR
f5nginx_agentMatch2.23.3
OR
f5nginx_agentMatch2.24.0
OR
f5nginx_agentMatch2.24.1
OR
f5nginx_agentMatch2.25.0
OR
f5nginx_agentMatch2.25.1
OR
f5nginx_agentMatch2.26.0
OR
f5nginx_agentMatch2.26.1
OR
f5nginx_agentMatch2.26.2
OR
f5nginx_agentMatch2.27.0
OR
f5nginx_agentMatch2.28.0
OR
f5nginx_agentMatch2.28.1
OR
f5nginx_agentMatch2.29.0
OR
f5nginx_agentMatch2.30.0
OR
f5nginx_agentMatch2.30.1
OR
f5nginx_agentMatch2.30.2
OR
f5nginx_agentMatch2.30.3
OR
f5nginx_agentMatch2.31.0
OR
f5nginx_agentMatch2.31.1
OR
f5nginx_agentMatch2.31.2
OR
f5nginx_agentMatch2.32.0
OR
f5nginx_agentMatch2.32.1
OR
f5nginx_agentMatch2.32.2
OR
f5nginx_agentMatch2.33.0
OR
f5nginx_agentMatch2.34.0
OR
f5nginx_api_connectivity_managerMatch1.0.0
OR
f5nginx_api_connectivity_managerMatch1.1.0
OR
f5nginx_api_connectivity_managerMatch1.1.1
OR
f5nginx_api_connectivity_managerMatch1.2.0
OR
f5nginx_api_connectivity_managerMatch1.3.0
OR
f5nginx_api_connectivity_managerMatch1.3.1
OR
f5nginx_api_connectivity_managerMatch1.4.0
OR
f5nginx_api_connectivity_managerMatch1.4.1
OR
f5nginx_api_connectivity_managerMatch1.5.0
OR
f5nginx_api_connectivity_managerMatch1.6.0
OR
f5nginx_api_connectivity_managerMatch1.7.0
OR
f5nginx_api_connectivity_managerMatch1.8.0
OR
f5nginx_api_connectivity_managerMatch1.9.0
OR
f5nginx_api_connectivity_managerMatch1.9.1
OR
f5nginx_api_connectivity_managerMatch1.9.2
OR
f5nginx_app_protectMatch2.4.0
OR
f5nginx_app_protectMatch3.0.0
OR
f5nginx_app_protectMatch3.1.0
OR
f5nginx_app_protectMatch4.0.1
OR
f5nginx_app_protectMatch4.1.0
OR
f5nginx_app_protectMatch4.2.0
OR
f5nginx_app_protectMatch4.3.0
OR
f5nginx_app_protectMatch4.4.0
OR
f5nginx_app_protectMatch3.11.0
OR
f5nginx_app_protectMatch3.12.1
OR
f5nginx_app_protectMatch3.12.2
OR
f5nginx_app_protectMatch4.0.0
OR
f5nginx_app_protectMatch4.1.0
OR
f5nginx_app_protectMatch4.10.0
OR
f5nginx_app_protectMatch4.2.0
OR
f5nginx_app_protectMatch4.3.0
OR
f5nginx_app_protectMatch4.4.0
OR
f5nginx_app_protectMatch4.5.0
OR
f5nginx_app_protectMatch4.6.0
OR
f5nginx_app_protectMatch4.7.0
OR
f5nginx_app_protectMatch4.8.0
OR
f5nginx_app_protectMatch4.8.1
OR
f5nginx_app_protectMatch4.9.0
OR
f5nginx_app_protectMatch5.0.0
OR
f5nginx_app_protectMatch5.1.0
OR
f5nginx_app_protectMatch5.2.0
OR
f5nginx_controllerMatch3.18.3
OR
f5nginx_controllerMatch3.19.1-APIM
OR
f5nginx_controllerMatch3.19.2-APIM
OR
f5nginx_controllerMatch3.19.3-APIM
OR
f5nginx_controllerMatch3.19.4-APIM
OR
f5nginx_controllerMatch3.19.5-APIM
OR
f5nginx_controllerMatch3.19.6-APIM
OR
f5nginx_controllerMatch3.20.0
OR
f5nginx_controllerMatch3.20.1
OR
f5nginx_controllerMatch3.21.0
OR
f5nginx_controllerMatch3.22.0
OR
f5nginx_controllerMatch3.22.1
OR
f5nginx_controllerMatch3.22.2
OR
f5nginx_controllerMatch3.22.3
OR
f5nginx_controllerMatch3.22.4
OR
f5nginx_controllerMatch3.22.5
OR
f5nginx_controllerMatch3.22.6
OR
f5nginx_controllerMatch3.22.7
OR
f5nginx_controllerMatch3.22.8
OR
f5nginx_controllerMatch3.22.9
OR
f5nginx_ingress_controllerMatch1.12.5
OR
f5nginx_ingress_controllerMatch2.2.1
OR
f5nginx_ingress_controllerMatch2.2.2
OR
f5nginx_ingress_controllerMatch2.3.0
OR
f5nginx_ingress_controllerMatch2.4.0
OR
f5nginx_ingress_controllerMatch2.4.1
OR
f5nginx_ingress_controllerMatch2.4.2
OR
f5nginx_ingress_controllerMatch3.0.0
OR
f5nginx_ingress_controllerMatch3.0.1
OR
f5nginx_ingress_controllerMatch3.0.2
OR
f5nginx_ingress_controllerMatch3.1.0
OR
f5nginx_ingress_controllerMatch3.1.1
OR
f5nginx_ingress_controllerMatch3.2.0
OR
f5nginx_ingress_controllerMatch3.2.1
OR
f5nginx_ingress_controllerMatch3.3.0
OR
f5nginx_ingress_controllerMatch3.3.1
OR
f5nginx_ingress_controllerMatch3.4.0
OR
f5nginx_ingress_controllerMatch3.4.1
OR
f5nginx_ingress_controllerMatch3.4.2
OR
f5nginx_ingress_controllerMatch3.5.0
OR
f5nginx_ingress_controllerMatch3.5.1
OR
f5nginx_ingress_controllerMatch3.5.2
OR
f5nginx_instance_managerMatch2.10.0
OR
f5nginx_instance_managerMatch2.10.1
OR
f5nginx_instance_managerMatch2.11.0
OR
f5nginx_instance_managerMatch2.12.0
OR
f5nginx_instance_managerMatch2.13.0
OR
f5nginx_instance_managerMatch2.13.1
OR
f5nginx_instance_managerMatch2.14.0
OR
f5nginx_instance_managerMatch2.14.1
OR
f5nginx_instance_managerMatch2.15.0
OR
f5nginx_instance_managerMatch2.15.1
OR
f5nginx_instance_managerMatch2.16.0
OR
f5nginx_instance_managerMatch2.2.0
OR
f5nginx_instance_managerMatch2.3.0
OR
f5nginx_instance_managerMatch2.3.1
OR
f5nginx_instance_managerMatch2.4.0
OR
f5nginx_instance_managerMatch2.5.0
OR
f5nginx_instance_managerMatch2.5.1
OR
f5nginx_instance_managerMatch2.6.0
OR
f5nginx_instance_managerMatch2.7.0
OR
f5nginx_instance_managerMatch2.8.0
OR
f5nginx_instance_managerMatch2.9.0
OR
f5nginx_instance_managerMatch2.9.1
OR
f5nginx_security_monitoringMatch1.0.0
OR
f5nginx_security_monitoringMatch1.1.0
OR
f5nginx_security_monitoringMatch1.2.0
OR
f5nginx_security_monitoringMatch1.3.0
OR
f5nginx_security_monitoringMatch1.4.0
OR
f5nginx_security_monitoringMatch1.5.0
OR
f5nginx_security_monitoringMatch1.6.0
OR
f5nginx_security_monitoringMatch1.7.0
OR
f5nginx_security_monitoringMatch1.7.1
OR
f5nginx_plusMatchR27
OR
f5nginx_plusMatchR28
OR
f5nginx_plusMatchR29
OR
f5nginx_plusMatchR30
OR
f5nginx_plusMatchR31
OR
f5nginx_plusMatchR32
OR
f5nginx_service_meshMatch1.1.0
OR
f5nginx_service_meshMatch1.2.0
OR
f5nginx_service_meshMatch1.2.1
OR
f5nginx_service_meshMatch1.3.0
OR
f5nginx_service_meshMatch1.3.1
OR
f5nginx_service_meshMatch1.4.0
OR
f5nginx_service_meshMatch1.4.1
OR
f5nginx_service_meshMatch1.5.0
OR
f5nginx_service_meshMatch1.6.0
OR
f5nginx_service_meshMatch1.7.0
OR
f5nginx_service_meshMatch2.0.0
OR
f5nginxMatch1.27.0
OR
f5nginxMatch1.28.0
OR
f5nginxMatch1.29.0
OR
f5nginxMatch1.29.1
OR
f5nginxMatch1.30.0
OR
f5nginxMatch1.31.0
OR
f5nginxMatch1.31.1
OR
f5nginxMatch1.32.0
OR
f5nginxMatch1.32.1
OR
f5f5os-aMatch1.5.1
OR
f5f5os-aMatch1.5.2
OR
f5f5os-aMatch1.7.0
OR
f5f5os-cMatch1.6.0
OR
f5f5os-cMatch1.6.1
OR
f5f5os-cMatch1.6.2
OR
f5big-iq_centralized_managementMatch8.1.0
OR
f5big-iq_centralized_managementMatch8.2.0
OR
f5big-iq_centralized_managementMatch8.3.0
OR
f5big-ip_ddos_hybrid_defenderMatch15.1.0
OR
f5big-ip_ddos_hybrid_defenderMatch15.1.1
OR
f5big-ip_ddos_hybrid_defenderMatch16.1.0
OR
f5big-ip_ddos_hybrid_defenderMatch17.1.0
OR
f5ssl_orchestratorMatch15.1.0
OR
f5ssl_orchestratorMatch15.1.1
OR
f5ssl_orchestratorMatch15.1.2
OR
f5ssl_orchestratorMatch15.1.9
OR
f5ssl_orchestratorMatch16.1.0
OR
f5ssl_orchestratorMatch16.1.1
OR
f5ssl_orchestratorMatch16.1.3
OR
f5ssl_orchestratorMatch16.1.4
OR
f5ssl_orchestratorMatch17.1.0
OR
f5ssl_orchestratorMatch17.1.1
OR
f5traffix_signaling_delivery_controllerMatch5.1.0
OR
f5traffix_signaling_delivery_controllerMatch5.2.0

5.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%