Linux kernel vulnerability CVE-2015-3339

2016-01-29T22:05:00
ID F5:K95345942
Type f5
Reporter f5
Modified 2017-10-31T21:27:00

Description

F5 Product Development has assigned ID 540018 (BIG-IP), ID 569537 (BIG-IQ), and ID 569538 (Enterprise Manager) to this vulnerability, and has evaluated the currently supported releases for potential vulnerability. Additionally, BIG-IP iHealth may list Heuristic H95345942 on the Diagnostics > Identified > Medium screen.

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | Vulnerable component or feature
---|---|---|---|---
BIG-IP LTM | 12.0.0
11.6.0 - 11.6.1
11.0.0 - 11.5.4
10.1.0 - 10.2.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP AAM | 12.0.0
11.6.0 - 11.6.1
11.4.0 - 11.5.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP AFM | 12.0.0
11.6.0 - 11.6.1
11.3.0 - 11.5.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP Analytics | 12.0.0
11.6.0 - 11.6.1
11.0.0 - 11.5.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP APM | 12.0.0
11.6.0 - 11.6.1
11.0.0 - 11.5.4
10.1.0 - 10.2.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP ASM | 12.0.0
11.6.0 - 11.6.1
11.0.0 - 11.5.4
10.1.0 - 10.2.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP DNS | 12.0.0 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3 | Medium | Linux kernel
BIG-IP Edge Gateway | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | None | Medium | Linux kernel
BIG-IP GTM | 11.6.0 - 11.6.1
11.0.0 - 11.5.4
10.1.0 - 10.2.4 | 11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP Link Controller | 12.0.0
11.6.0 - 11.6.1
11.0.0 - 11.5.4
10.1.0 - 10.2.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP PEM | 12.0.0
11.6.0 - 11.6.1
11.3.0 - 11.5.4 | 13.0.0
12.1.0 - 12.1.2
12.0.0 HF3
11.6.2
11.5.5 | Medium | Linux kernel
BIG-IP PSM | 11.0.0 - 11.4.1
10.1.0 - 10.2.4 | None | Medium | Linux kernel
BIG-IP WebAccelerator | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | None | Medium | Linux kernel
BIG-IP WOM | 11.0.0 - 11.3.0
10.1.0 - 10.2.4 | None | Medium | Linux kernel
ARX | None | 6.2.0 - 6.4.0 | Not vulnerable | None
Enterprise Manager | 3.0.0 - 3.1.1 | None | Medium | Linux kernel
FirePass | None | 7.0.0 | Not vulnerable | None
BIG-IQ Cloud | 4.0.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ Device | 4.2.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ Security | 4.0.0 - 4.5.0 | None | Medium | Linux kernel
BIG-IQ ADC | 4.5.0 | None | Medium | Linux kernel
BIG-IQ Centralized Management | 4.6.0 | None | Medium | Linux kernel
BIG-IQ Cloud and Orchestration | 1.0.0 | None | Medium | Linux kernel
LineRate | None | 2.5.0 - 2.6.1 | Not vulnerable | None
F5 WebSafe | None | 1.0.0 | Not vulnerable | None
Traffix SDC | 4.0.0 - 4.4.0
3.3.2 - 3.5.1 | 4.4 CF 9 and later* | Medium | Linux kernel

  • Fix is included in the October 2015 security update.

If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by upgrading to a version listed in the Versions known to be not vulnerable column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.

To determine the necessary upgrade path for your BIG-IQ system, you should understand the BIG-IQ product offering name changes. For more information, refer to K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems.

Mitigation

BIG-IP

To mitigate this vulnerability, allow only trusted admin users to have access to Advanced Shell (bash). Appliance mode does not expose this issue, as users are not allowed Advanced Shell (bash) access in this mode.

Traffix SDC

To mitigate this vulnerability, you can upgrade with the Traffix package for October 2015 (4.4 CF 9) or later versions, which includes the kernel fix. For more information, refer to the F5 Traffix representative for your region.