CWE
399
Advisory Published
CVE Published
Updated

CVE-2016-3156

First published: Wed Mar 16 2016(Updated: )

Destroy of network interface with huge number of ipv4 addresses keeps rtnl_lock for a very long time (up to hour). It blocks many network related operations, including for example creation of new incoming ssh connections. The problem is especially important for containers, container owner have enough permission to enable this trigger and then can block network access on whole host node. Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2">http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2</a> References: <a href="http://seclists.org/oss-sec/2016/q1/643">http://seclists.org/oss-sec/2016/q1/643</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q1/647">http://seclists.org/oss-sec/2016/q1/647</a>

Credit: cve@mitre.org cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/linux
5.10.223-1
5.10.226-1
6.1.123-1
6.1.128-1
6.12.12-1
6.12.16-1
SUSE Linux Enterprise Software Development Kit=11.0-sp4
SUSE Linux Enterprise Software Development Kit=12.0
SUSE Linux Enterprise Debuginfo=11.0-sp4
SUSE Linux Enterprise Desktop=12.0
SUSE Linux Enterprise Live Patching=12.0
SUSE Linux Enterprise Module for Public Cloud=12.0
SUSE Linux Enterprise Real Time Extension=11.0-sp4
SUSE Linux Enterprise Real Time Extension=12.0-sp1
SUSE Linux Enterprise Server=11.0-extra
SUSE Linux Enterprise Server=11.0-sp4
SUSE Linux Enterprise Server=12.0
SUSE Linux Enterprise Workstation Extension=12.0
Ubuntu=12.04
Linux kernel<=4.5.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2016-3156?

    CVE-2016-3156 carries a medium severity rating due to its impact on network operations.

  • How do I fix CVE-2016-3156?

    To mitigate CVE-2016-3156, upgrading to the patched versions of kernel packages is recommended.

  • Which systems are affected by CVE-2016-3156?

    CVE-2016-3156 affects various versions of SUSE Linux Enterprise and Ubuntu Linux among others.

  • What type of vulnerability is CVE-2016-3156?

    CVE-2016-3156 is a vulnerability that causes prolonged locking of the rtnl_lock, affecting network functions.

  • What are the consequences of CVE-2016-3156?

    The consequences of CVE-2016-3156 include the blocking of network operations like SSH connections, especially in container environments.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203