From the git commit: An deadlock condition can occur when sctp_accept() is called by the local software during a heartbeat timeout event after the 4-way handshake. Since sctp_assoc_migrate() changes both assoc->base.sk and assoc->ep, the bh_sock_lock in sctp_generate_heartbeat_event() will be taken with the listening socket but released with the new association socket. The result is a deadlock on any future attempts to take the listening socket lock, preventing sctp sockets from working correctly. The server must be running an service using the sctp protocol to be affected. Resources: https://patchwork.ozlabs.org/patch/522411/ https://patchwork.ozlabs.org/patch/522412/ Patch commit notes (net-next.git): https://kernel.googlesource.com/pub/scm/linux/kernel/git/horms/ipvs/+/635682a14427d241bab7bbdeebb48a7d7b91638e CVE Request: http://seclists.org/oss-sec/2016/q1/66
CVE assignment: http://seclists.org/oss-sec/2016/q1/66
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1298437]
kernel-4.3.4-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2 and may be addressed in future updates. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2016:0715 https://rhn.redhat.com/errata/RHSA-2016-0715.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1277 https://access.redhat.com/errata/RHSA-2016:1277
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1301 https://access.redhat.com/errata/RHSA-2016:1301
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2016:1341 https://access.redhat.com/errata/RHSA-2016:1341