logo
DATABASE RESOURCES PRICING ABOUT US

Linux kernel vulnerability CVE-2017-2636

Description

F5 Product Development has assigned IDs 651243 and 651245 (BIG-IP), ID 651300 (BIG-IQ, iWorkflow), and ID 651295 (Enterprise Manager) to this vulnerability. Additionally, [BIG-IP iHealth](<http://www.f5.com/support/support-tools/big-ip-ihealth/>) may list Heuristic H18015201 on the **Diagnostics** > **Identified** > **Medium** screen. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table: Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature ---|---|---|---|--- BIG-IP LTM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP AAM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 | Medium | Linux kernel BIG-IP AFM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 | Medium | Linux kernel BIG-IP Analytics | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP APM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP ASM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP DNS | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 | Medium | Linux kernel BIG-IP Edge Gateway | None | 11.2.1 | Medium | Linux kernel BIG-IP GTM | None | 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP Link Controller | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 11.2.1 | Medium | Linux kernel BIG-IP PEM | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.4.0 - 11.6.1 | Medium | Linux kernel BIG-IP PSM | None | 11.4.0 - 11.4.1 | Medium | Linux kernel BIG-IP WebAccelerator | None | 11.2.1 | Medium | Linux kernel BIG-IP WebSafe | 13.0.0 | 13.0.1 12.0.0 - 12.1.2 11.6.0 - 11.6.1 | Medium | Linux kernel ARX | None | 6.2.0 - 6.4.0 | Not vulnerable | None Enterprise Manager | 3.1.1 | None | Medium | Linux kernel BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Medium | Linux kernel BIG-IQ Device | 4.2.0 - 4.5.0 | None | Medium | Linux kernel BIG-IQ Security | 4.0.0 - 4.5.0 | None | Medium | Linux kernel BIG-IQ ADC | 4.5.0 | None | Medium | Linux kernel BIG-IQ Centralized Management | 5.0.0 - 5.1.0 4.6.0 | None | Medium | Linux kernel BIG-IQ Cloud and Orchestration | 1.0.0 | None | Medium | Linux kernel F5 iWorkflow | 2.0.0 - 2.1.0 | None | Medium | Linux kernel LineRate | None | 2.5.0 - 2.6.2 | Not vulnerable | None Traffix SDC | 5.0.0 - 5.1.0 4.0.0 - 4.4.0 | None | Low | Linux kernel If you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists. To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>). Mitigation To confirm the status of the **n_hdlc** kernel module, you can use the **lsmod | grep -i n_hdlc **Linux command from the command line of the F5 product. If the **n_hdlc **module is loaded, output appears similar to the following example: # lsmod | grep -i n_hdlc n_hdlc 17455 0 To mitigate this vulnerability, you can blacklist the **n_hdlc** module to prevent accidental or intentional loading. To do so, perform the following procedure: **Impact of action:** Performing the following procedure should not have a negative impact on your system. 1. Log in to the command line of the F5 product as the root user. 2. To prevent accidental or intentional loading of the **n_hdlc **module, type the following command: echo "install n_hdlc /bin/true" >> /etc/modprobe.d/disable-n_hdlc.conf 3. Optional: If the **n_hdlc** module is already loaded and in use by a process, then reboot the system. You can also mitigate this vulnerability by permitting management access to the F5 product only over a secure network and limiting shell access to trusted users. For more information, refer to [K5380: Specifying allowable IP ranges for SSH access](<https://support.f5.com/csp/article/K5380>) and [K13092: Overview of securing access to the BIG-IP system](<https://support.f5.com/csp/article/K13092>). * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>) * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>) * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>) * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>) * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)


Affected Software


CPE Name Name Version
BIG-IP LTM 13.0.0
BIG-IP AAM 13.0.0
BIG-IP AFM 13.0.0
BIG-IP Analytics 13.0.0
BIG-IP APM 13.0.0
BIG-IP ASM 13.0.0
BIG-IP DNS 13.0.0
BIG-IP Link Controller 13.0.0
BIG-IP PEM 13.0.0
BIG-IP WebSafe 13.0.0
Enterprise Manager 3.1.1
BIG-IQ Cloud 4.5.0
BIG-IQ Device 4.5.0
BIG-IQ Security 4.5.0
BIG-IQ ADC 4.5.0
BIG-IQ Centralized Management 5.1.0
BIG-IQ Cloud and Orchestration 1.0.0
F5 iWorkflow 2.1.0
Traffix SDC 5.1.0

Related