The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:18:49.182Z
Reserved: 2017-02-12T00:00:00
Link: CVE-2017-5972
No data.
Status : Deferred
Published: 2017-02-14T06:59:00.277
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-5972
OpenCVE Enrichment
No data.
Weaknesses