Lucene search

K
f5F5SOL15299
HistoryJun 02, 2014 - 12:00 a.m.

SOL15299 - Linux kernel vulnerability CVE-2013-2888

2014-06-0200:00:00
support.f5.com
55

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.0%

Recommended action

If the previous table lists a version in the Versions known to be not vulnerable column, you can eliminate this vulnerability by upgrading to the listed version. If the table does not list any version in the column, then no upgrade candidate currently exists.

To mitigate the risk posed by this vulnerability, you can deploy devices in a secure location.

Impact of action: Performing the following procedure should not have a negative impact on your system.

Supplemental Information

  • SOL9970: Subscribing to email notifications regarding F5 products
  • SOL9957: Creating a custom RSS feed to view new and updated documents
  • SOL4602: Overview of the F5 security vulnerability response policy
  • SOL4918: Overview of the F5 critical issue hotfix policy
  • SOL167: Downloading software and firmware from F5
  • SOL13123: Managing BIG-IP product hotfixes (11.x)
  • SOL10025: Managing BIG-IP product hotfixes (10.x)
  • SOL6845: Managing BIG-IP product hotfixes (9.x)
  • SOL9502: BIG-IP hotfix matrix
  • SOL12766: ARX hotfix matrix
  • SOL3430: Installing FirePass hotfixes
  • SOL6664: Obtaining and installing OPSWAT hotfixes for FirePass
  • SOL10942: Installing OPSWAT hotfixes on BIG-IP APM systems

References

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

65.0%