Note: Versions that are not listed in this Solution have not been evaluated for vulnerability to this security advisory. For information about F5 Networks’ security policy regarding evaluating older and unsupported versions of F5 Networks products, refer to K4602: Overview of F5 Networks security vulnerability response policy.
F5 Networks products and versions that have been evaluated for this Security Advisory
Product | Affected | Not Affected |
---|---|---|
BIG-IP LTM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP GTM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP ASM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP Link Controller | None | 9.x |
10.x | ||
11.x | ||
BIG-IP WebAccelerator | None | 9.x |
10.x | ||
11.x | ||
BIG-IP PSM | None | 9.x |
10.x | ||
11.x | ||
BIG-IP WAN Optimization | None | 10.x |
11.x | ||
BIG-IP APM | None | 10.x |
11.x | ||
BIG-IP Edge Gateway | None | 10.x |
11.x | ||
BIG-IP Analytics | None | 11.x |
BIG-IP AFM | None | 11.x |
BIG-IP PEM | ||
None | 11.x | |
FirePass | None | 5.x |
6.x | ||
7.x | ||
Enterprise Manager | None | 1.x |
2.x | ||
3.x | ||
ARX | None | 2.x |
3.x | ||
4.x | ||
5.x | ||
6.x |
Vulnerability description
The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.
Information about this advisory is available at the following location: