Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3688

Опубликовано: 30 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.16.7-1package
linux-2.6removedpackage

Примечания

  • Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=26b87c7881006311828bb0ab271a551a62dcceb4 (v3.18-rc1)

EPSS

Процентиль: 85%
0.02624
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

redhat
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

nvd
больше 10 лет назад

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 85%
0.02624
Низкий
Уязвимость CVE-2014-3688