{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-10-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-12-20T16:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://linux.oracle.com/errata/ELSA-2014-3087.html"},{"name":"SUSE-SU-2015:1489","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"},{"name":"HPSBGN03285","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2"},{"name":"SUSE-SU-2015:0736","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"name":"USN-2418-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2418-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.oracle.com/errata/ELSA-2014-3089.html"},{"name":"SUSE-SU-2015:0652","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"name":"RHSA-2015:0062","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"name":"USN-2417-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2417-1"},{"name":"HPSBGN03282","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=142722544401658&w=2"},{"name":"SUSE-SU-2015:0178","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/torvalds/linux/commit/b69040d8e39f20d5215a03502a8e8b4c6ab78395"},{"tags":["x_refsource_CONFIRM"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.oracle.com/errata/ELSA-2014-3088.html"},{"name":"DSA-3060","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2014/dsa-3060"},{"name":"SUSE-SU-2015:0481","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"name":"62428","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/62428"},{"name":"openSUSE-SU-2015:0566","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"name":"70766","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/70766"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1155731"},{"name":"SUSE-SU-2015:0529","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"name":"RHSA-2015:0115","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2015-0115.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T10:50:18.256Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.oracle.com/errata/ELSA-2014-3087.html"},{"name":"SUSE-SU-2015:1489","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"},{"name":"HPSBGN03285","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2"},{"name":"SUSE-SU-2015:0736","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"name":"USN-2418-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2418-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.oracle.com/errata/ELSA-2014-3089.html"},{"name":"SUSE-SU-2015:0652","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"name":"RHSA-2015:0062","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"name":"USN-2417-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2417-1"},{"name":"HPSBGN03282","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=142722544401658&w=2"},{"name":"SUSE-SU-2015:0178","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/torvalds/linux/commit/b69040d8e39f20d5215a03502a8e8b4c6ab78395"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.oracle.com/errata/ELSA-2014-3088.html"},{"name":"DSA-3060","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2014/dsa-3060"},{"name":"SUSE-SU-2015:0481","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"name":"62428","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/62428"},{"name":"openSUSE-SU-2015:0566","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"name":"70766","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/70766"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1155731"},{"name":"SUSE-SU-2015:0529","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"name":"RHSA-2015:0115","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2015-0115.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2014-3687","datePublished":"2014-11-10T11:00:00.000Z","dateReserved":"2014-05-14T00:00:00.000Z","dateUpdated":"2024-08-06T10:50:18.256Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}