Bug ID 1002109: Xen binaries do not follow security best practices

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP TMOS(all modules)

Fixed In:
16.1.0, 15.1.4, 14.1.4.4, 13.1.5

Opened: Mar 13, 2021

Severity: 1-Blocking

Symptoms

The following xen* binaries have multiple violations of security best practices. usr/bin/xenstore /usr/bin/xenstore-exists /usr/bin/xenstore-ls /usr/bin/xenstore-read /usr/bin/xenstore-rm /usr/bin/xenstore-watch /usr/bin/xenstore-chmod /usr/bin/xenstore-list /usr/bin/xenstore-write

Impact

The issue lead to violation of security best practices.

Conditions

The violations can be seen on BIG-IP by running following script. https://github.com/slimm609/checksec.sh

Workaround

None

Fix Information

Fixed an issue with certain xen* binaries.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips