Back to bug 1327484

Who When What Removed Added
Adam Mariš 2016-04-15 08:35:13 UTC CC security-response-team
Red Hat Bugzilla 2016-04-15 08:35:13 UTC Doc Type --- Bug Fix
Adam Mariš 2016-04-15 08:37:07 UTC Blocks 1327486
Wade Mealing 2016-04-15 10:10:28 UTC CC wmealing
Assignee security-response-team wmealing
Tomas Hoger 2016-04-15 10:56:15 UTC Assignee wmealing security-response-team
Martin Prpič 2016-04-27 08:06:57 UTC Alias CVE-2016-3707
Martin Prpič 2016-04-27 08:07:05 UTC Summary EMBARGOED kernel-rt: Sending SysRq command via ICMP echo request EMBARGOED CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request
Wade Mealing 2016-04-28 05:20:59 UTC Whiteboard impact=moderate,public=no,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=new impact=moderate,public=no,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2016-04-28 05:21:22 UTC Depends On 1331240
Wade Mealing 2016-04-28 05:21:28 UTC Depends On 1331241
Wade Mealing 2016-04-28 05:21:37 UTC Depends On 1331242
Wade Mealing 2016-04-29 13:06:57 UTC Whiteboard impact=moderate,public=no,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=notaffected impact=moderate,public=no,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2016-05-03 04:48:06 UTC Comment 3 is private 1 0
Wade Mealing 2016-05-17 00:16:47 UTC Whiteboard impact=moderate,public=no,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2016-05-17 00:22:32 UTC Summary EMBARGOED CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request CVE-2016-3707 kernel-rt: Sending SysRq command via ICMP echo request
Wade Mealing 2016-05-17 00:22:39 UTC Group security, qe_staff
Wade Mealing 2016-05-17 01:30:11 UTC Doc Text Instructions for setting up the environment is:

https://lwn.net/Articles/448790/

and

http://seclists.org/oss-sec/2016/q2/349

There is no exploit payload, other than the information
that is already public.
Wade Mealing 2016-05-18 03:45:09 UTC Doc Text Instructions for setting up the environment is:

https://lwn.net/Articles/448790/

and

http://seclists.org/oss-sec/2016/q2/349

There is no exploit payload, other than the information
that is already public.
A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature is not enabled by default and requries elevated priveledges to configure. An attacker could use this to reboot a system across a network.
Wade Mealing 2016-05-18 03:50:04 UTC Whiteboard impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=cwe=CWE-312-,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected
Wade Mealing 2016-05-18 03:52:27 UTC Whiteboard impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=5.1/AV:N/AC:H/Au:N/C:P/I:P/A:P,cwe=cwe=CWE-312-,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cwe=cwe,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected
Eric Christensen 2016-06-01 16:31:07 UTC CC sparks
Doc Text A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature is not enabled by default and requries elevated priveledges to configure. An attacker could use this to reboot a system across a network. A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature is not enabled by default and requires elevated privileges to configure. An attacker could use this to reboot a system across a network.
Eric Christensen 2016-06-07 22:15:06 UTC CC sparks
Martin Prpič 2016-06-16 13:26:46 UTC Doc Text A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature is not enabled by default and requires elevated privileges to configure. An attacker could use this to reboot a system across a network. A flaw was found in the way the realtime kernel processed specially crafted ICMP echo requests. A remote attacker could use this flaw to trigger a sysrql function based on values in the ICMP packet, allowing them to remotely restart the system. Note that this feature is not enabled by default and requires elevated privileges to be configured.
Vladis Dronov 2016-06-24 11:02:00 UTC Status NEW CLOSED
CC vdronov
Resolution --- ERRATA
Last Closed 2016-06-24 07:02:00 UTC
Andrej Nemec 2016-07-11 13:58:19 UTC CC anemec
Whiteboard impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cwe=cwe,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cwe=CWE-312,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected
Product Security DevOps Team 2019-09-29 13:47:33 UTC Whiteboard impact=moderate,public=20160517,reported=20160414,source=redhat,cvss2=7.1/AV:N/AC:M/Au:N/C:N/I:N/A:C,cwe=CWE-312,rhel-4/kernel=notaffected,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=notaffected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/kernel-biscayne=notaffected,fedora-all/kernel=notaffected

Back to bug 1327484