First published: Fri Apr 15 2016(Updated: )
A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature was introduced in the kernel-rt only and is not shipping with standard Red Hat Enterprise Linux kernels. Remote attacker could exploit this feature using bruteforce to submit arbitrary SysRq commands. Resources: <a href="https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.7-rt16.patch.gz">https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.7-rt16.patch.gz</a> Upstream discussion: <a href="https://lwn.net/Articles/448790/">https://lwn.net/Articles/448790/</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/349">http://seclists.org/oss-sec/2016/q2/349</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel RT | <=3.10.0 | |
redhat enterprise Linux for real time | =7 | |
redhat enterprise Linux for real time for nfv | =7 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3707 has been classified as a moderate severity vulnerability.
To fix CVE-2016-3707, it is recommended to update the kernel-rt to a version that is higher than 3.10.0.
CVE-2016-3707 affects systems running kernel-rt versions up to 3.10.0, specifically Red Hat Enterprise Linux for Real Time and SUSE Linux Enterprise Real Time Extension.
CVE-2016-3707 allows an attacker to submit a crafted ICMP echo request, potentially triggering unintended kernel behavior.
No, CVE-2016-3707 specifically affects the kernel-rt and is not present in standard Red Hat Enterprise Linux kernels.