First published: Fri Apr 15 2016(Updated: )
A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature was introduced in the kernel-rt only and is not shipping with standard Red Hat Enterprise Linux kernels. Remote attacker could exploit this feature using bruteforce to submit arbitrary SysRq commands. Resources: <a href="https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.7-rt16.patch.gz">https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.7-rt16.patch.gz</a> Upstream discussion: <a href="https://lwn.net/Articles/448790/">https://lwn.net/Articles/448790/</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/349">http://seclists.org/oss-sec/2016/q2/349</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux Kernel-rt | <=3.10.0 | |
Redhat Enterprise Linux For Real Time | =7 | |
Redhat Enterprise Linux For Real Time For Nfv | =7 | |
Novell Suse Linux Enterprise Real Time Extension | =12.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.