Linux kernel vulnerability CVE-2012-6657

2015-01-22T04:08:00
ID F5:K16011
Type f5
Reporter f5
Modified 2016-09-06T20:32:00

Description

F5 Product Development has assigned ID 499067 (BIG-IP), ID 500789 (Enterprise Manager), and ID 500788 (BIG-IQ) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product| Versions known to be vulnerable| Versions known to be not vulnerable| Vulnerable component or feature
---|---|---|---
BIG-IP LTM| 11.0.0 - 11.6.0
10.1.0 - 10.2.4| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP AAM| 11.4.0 - 11.6.0| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP AFM| 11.3.0 - 11.6.0| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP Analytics| 11.0.0 - 11.6.0| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP APM| 11.0.0 - 11.6.0
10.1.0 - 10.2.4| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP ASM| 11.0.0 - 11.6.0
10.1.0 - 10.2.4| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP Edge Gateway| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Linux kernel
BIG-IP GTM| 11.0.0 - 11.6.0
10.1.0 - 10.2.4| 11.5.4 HF2| Linux kernel
BIG-IP Link Controller| 11.0.0 - 11.6.0
10.1.0 - 10.2.4| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP PEM| 11.3.0 - 11.6.0| 12.0.0
11.5.4 HF2| Linux kernel
BIG-IP PSM| 11.0.0 - 11.4.1
10.1.0 - 10.2.4| None| Linux kernel
BIG-IP WebAccelerator| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Linux kernel
BIG-IP WOM| 11.0.0 - 11.3.0
10.1.0 - 10.2.4| None| Linux kernel
ARX| None| 6.0.0 - 6.4.0| None
Enterprise Manager| 3.0.0 - 3.1.1
2.1.0 - 2.3.0| None| Linux kernel
FirePass| None| 7.0.0
6.0.0 - 6.1.0| None
BIG-IQ Cloud| 4.0.0 - 4.4.0| None| Linux kernel
BIG-IQ Device| 4.2.0 - 4.4.0| None| Linux kernel
BIG-IQ Security| 4.0.0 - 4.4.0| None| Linux kernel
LineRate| None| 2.2.0 - 2.5.0
1.6.0 - 1.6.4| None

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the listed version is older than the version you are currently running, or if the table does not list any version in the column, then no upgrade candidate currently exists.

To mitigate this vulnerability, you should only permit management access to F5 products over a secure network and limit shell access to trusted users. For more information, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x - 12.x) and K13092: Overview of securing access to the BIG-IP system.