First published: Wed Mar 16 2016(Updated: )
Destroy of network interface with huge number of ipv4 addresses keeps rtnl_lock for a very long time (up to hour). It blocks many network related operations, including for example creation of new incoming ssh connections. The problem is especially important for containers, container owner have enough permission to enable this trigger and then can block network access on whole host node. Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2">http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2</a> References: <a href="http://seclists.org/oss-sec/2016/q1/643">http://seclists.org/oss-sec/2016/q1/643</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q1/647">http://seclists.org/oss-sec/2016/q1/647</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
SUSE Linux Enterprise Software Development Kit | =11.0-sp4 | |
SUSE Linux Enterprise Software Development Kit | =12.0 | |
SUSE Linux Enterprise Debuginfo | =11.0-sp4 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Live Patching | =12.0 | |
SUSE Linux Enterprise Module for Public Cloud | =12.0 | |
SUSE Linux Enterprise Real Time Extension | =11.0-sp4 | |
SUSE Linux Enterprise Real Time Extension | =12.0-sp1 | |
SUSE Linux Enterprise Server | =11.0-extra | |
SUSE Linux Enterprise Server | =11.0-sp4 | |
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Workstation Extension | =12.0 | |
Ubuntu | =12.04 | |
Linux kernel | <=4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3156 carries a medium severity rating due to its impact on network operations.
To mitigate CVE-2016-3156, upgrading to the patched versions of kernel packages is recommended.
CVE-2016-3156 affects various versions of SUSE Linux Enterprise and Ubuntu Linux among others.
CVE-2016-3156 is a vulnerability that causes prolonged locking of the rtnl_lock, affecting network functions.
The consequences of CVE-2016-3156 include the blocking of network operations like SSH connections, especially in container environments.