A flaw was found in the kernel-rt in which an attacker could submit a specially crafted ICMP echo request which can trigger a sysrq function based on values in the ICMP packet. This feature was introduced in the kernel-rt only and is not shipping with standard Red Hat Enterprise Linux kernels. Remote attacker could exploit this feature using bruteforce to submit arbitrary SysRq commands. Resources: https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.7-rt16.patch.gz Upstream discussion: https://lwn.net/Articles/448790/ CVE request: http://seclists.org/oss-sec/2016/q2/349
Statement: This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6 and 7. This issue affects the Linux kernel-rt packages as shipped with Red Hat Enterprise Linux 7 and MRG-2 and may be addressed in a future update.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1301 https://access.redhat.com/errata/RHSA-2016:1301
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2016:1341 https://access.redhat.com/errata/RHSA-2016:1341