DescriptionThe TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
|National Vulnerability Database||SUSE|
|National Vulnerability Database|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Desktop 12 SP1||kernel-source||Unsupported|
|SUSE Linux Enterprise Desktop 12 SP2||kernel-source||Not affected|
|SUSE Linux Enterprise Server 11 SP4||kernel-source||Affected|
|SUSE Linux Enterprise Server 12 SP1||kernel-source||Unsupported|
|SUSE Linux Enterprise Server 12 SP2||kernel-source||Not affected|