Linux kernel vulnerability CVE-2016-7097

2017-06-23T02:13:00
ID F5:K31603170
Type f5
Reporter f5
Modified 2019-08-13T17:35:00

Description

F5 Product Development has assigned IDs 652516 and 748870 (BIG-IP), ID 669855 (BIG-IQ), ID 670353 (F5 iWorkflow), and ID 669854 (Enterprise Manager) to this vulnerability. Additionally, F5 iHealth may list Heuristic H31603170 on the Diagnostics > Identified > Medium page.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table.

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP AAM | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP AFM | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP Analytics | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP APM | 14.0.0
13.0.0 - 13.1.0
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 13.1.0.8
12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP ASM | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP DNS | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2 | 12.1.3 | Medium | Linux kernel
BIG-IP Edge Gateway | 11.2.1 | None | Medium | Linux kernel
BIG-IP GTM | 11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP Link Controller | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4
11.2.1 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP PEM | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1
11.4.0 - 11.5.4 | 12.1.3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP PSM | 11.4.0 - 11.4.1 | None | Medium | Linux kernel
BIG-IP WebAccelerator | 11.2.1 | None | Medium | Linux kernel
BIG-IP WebSafe | 14.0.0
13.0.0 - 13.1.1
12.0.0 - 12.1.2
11.6.0 - 11.6.1 | 12.1.3
11.6.2 | Medium | Linux kernel
ARX | None | 6.2.0 - 6.4.0 | Not vulnerable | None
Enterprise Manager | 3.1.1 | None | Medium | Linux kernel
BIG-IQ Centralized Management | 6.0.0 - 6.1.0
5.0.0 - 5.4.0
4.6.0 | 7.0.0 | Medium | Linux kernel
BIG-IQ Cloud | 4.4.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ Device | 4.4.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ Security | 4.4.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ ADC | 4.5.0 | None | Medium | Linux kernel
BIG-IQ Cloud and Orchestration | 1.0.0 | None | Medium | Linux kernel
F5 iWorkflow | 2.0.0 - 2.3.0 | None | Medium | Linux kernel
LineRate | None | 2.5.0 - 2.6.2 | Not vulnerable | None
Traffix SDC | 5.0.0 - 5.0.0
4.4.0 | 5.1.0 | Medium | Linux kernel

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.

Mitigation

To mitigate this vulnerability, you should permit management access to F5 products only over a secure network and restrict command line access for affected systems to only trusted users. For more information, refer to K13309: Restricting access to the Configuration utility by source IP address (11.x - 15.x) and K13092: Overview of securing access to the BIG-IP system.