First published: Mon Jan 11 2016(Updated: )
From the git commit: An deadlock condition can occur when sctp_accept() is called by the local software during a heartbeat timeout event after the 4-way handshake. Since sctp_assoc_migrate() changes both assoc->base.sk and assoc->ep, the bh_sock_lock in sctp_generate_heartbeat_event() will be taken with the listening socket but released with the new association socket. The result is a deadlock on any future attempts to take the listening socket lock, preventing sctp sockets from working correctly. The server must be running an service using the sctp protocol to be affected. Resources: <a href="https://patchwork.ozlabs.org/patch/522411/">https://patchwork.ozlabs.org/patch/522411/</a> <a href="https://patchwork.ozlabs.org/patch/522412/">https://patchwork.ozlabs.org/patch/522412/</a> Patch commit notes (net-next.git): <a href="https://kernel.googlesource.com/pub/scm/linux/kernel/git/horms/ipvs/+/635682a14427d241bab7bbdeebb48a7d7b91638e">https://kernel.googlesource.com/pub/scm/linux/kernel/git/horms/ipvs/+/635682a14427d241bab7bbdeebb48a7d7b91638e</a> CVE Request: <a href="http://seclists.org/oss-sec/2016/q1/66">http://seclists.org/oss-sec/2016/q1/66</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <4.3 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8767 is a vulnerability in the Linux kernel that allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
CVE-2015-8767 has a severity level of medium.
The affected software versions include Linux kernel versions before 4.3.
To fix CVE-2015-8767, update your Linux kernel to version 4.3 or later.
You can find more information about CVE-2015-8767 on the following references: [Link 1](https://patchwork.ozlabs.org/patch/522411/), [Link 2](https://patchwork.ozlabs.org/patch/522412/), [Link 3](https://kernel.googlesource.com/pub/scm/linux/kernel/git/horms/ipvs/+/635682a14427d241bab7bbdeebb48a7d7b91638e).