SCIENTIFIC-LINUX-ERRATA Archives

October 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Connie Sieh <[log in to unmask]>
Reply To:
Connie Sieh <[log in to unmask]>
Date:
Wed, 17 Oct 2012 17:06:34 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (41 lines)
Synopsis:          Important: kernel security and bug fix update
Issue Date:        2012-10-16
CVE Numbers:       CVE-2012-3412
--

This update fixes the following security issue:

* A flaw was found in the way socket buffers (skb) requiring TSO (TCP
segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)

This update also fixes several bugs.

The system must be rebooted for this update to take effect.
--

SL6
   x86_64
     kernel-2.6.32-279.11.1.el6.x86_64.rpm
     kernel-debug-2.6.32-279.11.1.el6.x86_64.rpm
     kernel-debug-devel-2.6.32-279.11.1.el6.x86_64.rpm
     kernel-devel-2.6.32-279.11.1.el6.x86_64.rpm
     kernel-headers-2.6.32-279.11.1.el6.x86_64.rpm
     perf-2.6.32-279.11.1.el6.x86_64.rpm
     python-perf-2.6.32-279.11.1.el6.x86_64.rpm
   i386
     kernel-2.6.32-279.11.1.el6.i686.rpm
     kernel-debug-2.6.32-279.11.1.el6.i686.rpm
     kernel-debug-devel-2.6.32-279.11.1.el6.i686.rpm
     kernel-devel-2.6.32-279.11.1.el6.i686.rpm
     kernel-headers-2.6.32-279.11.1.el6.i686.rpm
     perf-2.6.32-279.11.1.el6.i686.rpm
     python-perf-2.6.32-279.11.1.el6.i686.rpm
   noarch
     kernel-doc-2.6.32-279.11.1.el6.noarch.rpm
     kernel-firmware-2.6.32-279.11.1.el6.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2