CVE-2017-5972
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-5972 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue affects Red Hat Enterprise Linux 5,6, 7 and MRG-2 kernels. Red Hat has no plans to fix this issue at this time.
While performance enhancements have been made upstream, Red Hat Product Security believes the report to be invalid and able to be mitigated with synproxy. This flaw is currently under investigation for validity and Red Hat is asking to revoke the CVE.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 7.5 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity Impact | None |
| Availability Impact | High |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Enterprise MRG 2 | realtime-kernel | Will not fix |
| Red Hat Enterprise Linux 7 | kernel-rt | Will not fix |
| Red Hat Enterprise Linux 7 | kernel | Will not fix |
| Red Hat Enterprise Linux 6 | kernel | Will not fix |
| Red Hat Enterprise Linux 5 | kernel | Not affected |
CVE description copyright © 2017, The MITRE Corporation
