Security Advisory Description
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance. (CVE-2024-36387)
Impact
There is no impact; F5 products are not affected by this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
f5 | big-ip_next | 20.0.0 | cpe:2.3:a:f5:big-ip_next:20.0.0:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.0.1 | cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.0.2 | cpe:2.3:a:f5:big-ip_next:20.0.2:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.0.x | cpe:2.3:a:f5:big-ip_next:20.0.x:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.1.0 | cpe:2.3:a:f5:big-ip_next:20.1.0:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.1.1 | cpe:2.3:a:f5:big-ip_next:20.1.1:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.1.x | cpe:2.3:a:f5:big-ip_next:20.1.x:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.2.0 | cpe:2.3:a:f5:big-ip_next:20.2.0:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.2.1 | cpe:2.3:a:f5:big-ip_next:20.2.1:*:*:*:*:*:*:* |
f5 | big-ip_next | 20.2.x | cpe:2.3:a:f5:big-ip_next:20.2.x:*:*:*:*:*:*:* |