CVE-2016-3156
kernel: ipv4: denial of service when destroying a network interface
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
La implementación IPv4 en el kernel de Linux en versiones anteriores a 4.5.2 no maneja adecuadamente la destrucción de objetos de dispositivo, lo que permite a usuarios del SO invitado provocar una denegación de servicio (corte de la red del sistema operativo anfitrión) disponiendo un gran número de direcciones IP.
A security flaw was found in the Linux kernel's networking subsystem that destroying the network interface with huge number of ipv4 addresses assigned keeps "rtnl_lock" spinlock for a very long time (up to hour). This blocks many network-related operations, including creation of new incoming ssh connections.
The problem is especially important for containers, as the container owner has enough permissions to trigger this and block a network access on a whole host, outside the container.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-03-15 CVE Reserved
- 2016-04-27 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (27)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbd40ea0180a2d328c5adc61414dc8bab9335ce2 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2016/03/15/3 | Mailing List | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | X_refsource_confirm | |
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/84428 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/torvalds/linux/commit/fbd40ea0180a2d328c5adc61414dc8bab9335ce2 | 2023-09-12 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Suse Linux Enterprise Software Development Kit Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" and version "11.0" | sp4 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Software Development Kit Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Software Development Kit" and version "12.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Debuginfo Search vendor "Novell" for product "Suse Linux Enterprise Debuginfo" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Debuginfo" and version "11.0" | sp4 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Desktop Search vendor "Novell" for product "Suse Linux Enterprise Desktop" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Desktop" and version "12.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Live Patching Search vendor "Novell" for product "Suse Linux Enterprise Live Patching" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Live Patching" and version "12.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Module For Public Cloud Search vendor "Novell" for product "Suse Linux Enterprise Module For Public Cloud" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Module For Public Cloud" and version "12.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Real Time Extension Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" and version "11.0" | sp4 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Real Time Extension Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Real Time Extension" and version "12.0" | sp1 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Server Search vendor "Novell" for product "Suse Linux Enterprise Server" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0" | extra |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Server Search vendor "Novell" for product "Suse Linux Enterprise Server" | 11.0 Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "11.0" | sp4 |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Server Search vendor "Novell" for product "Suse Linux Enterprise Server" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Server" and version "12.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Suse Linux Enterprise Workstation Extension Search vendor "Novell" for product "Suse Linux Enterprise Workstation Extension" | 12.0 Search vendor "Novell" for product "Suse Linux Enterprise Workstation Extension" and version "12.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | lts |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.5.1 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.5.1" | - |
Affected
|