Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2016-3707

Published: 27 June 2016

The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.

Notes

AuthorNote
sbeattie
only affects kernels with PREEMPT_RT applied and enabled,
which is not the case in Ubuntu kernels.

Priority

Medium

Cvss 3 Severity Score

8.1

Score breakdown

Status

Package Release Status
linux-aws-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-aws-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-aws-hwe
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-azure
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Not vulnerable
(rt kernels only)
upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-azure-4.15
Launchpad, Ubuntu, Debian
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

xenial Does not exist

linux-azure-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-gcp
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-gcp-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-gcp-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-gke-4.15
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-gke-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-gke-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-hwe
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-hwe-edge
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-kvm
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-lts-trusty
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-lts-xenial
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Does not exist

trusty Not vulnerable
(rt kernels only)
upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-oem
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-oem-5.6
Launchpad, Ubuntu, Debian
upstream Not vulnerable
(rt kernels only)
bionic Does not exist

eoan Does not exist

focal Not vulnerable
(rt kernels only)
trusty Does not exist

xenial Does not exist

linux-oracle
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-oracle-5.0
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-oracle-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-raspi2
Launchpad, Ubuntu, Debian
xenial Not vulnerable
(rt kernels only)
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
linux-raspi2-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-riscv
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-snapdragon
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Not vulnerable
(rt kernels only)
upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-aws
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Not vulnerable
(rt kernels only)
trusty Not vulnerable
(rt kernels only)
upstream Not vulnerable
(rt kernels only)
xenial Not vulnerable
(rt kernels only)
linux-azure-5.3
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-oem-osp1
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(rt kernels only)
eoan Not vulnerable
(rt kernels only)
focal Does not exist

trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

linux-raspi
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Not vulnerable
(rt kernels only)
trusty Does not exist

upstream Not vulnerable
(rt kernels only)
xenial Does not exist

Severity score breakdown

Parameter Value
Base score 8.1
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H