|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for kernel RHSA-2012:1366-01|
|Summary:||The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.
The kernel packages contain the Linux kernel, the core of any Linux
This update fixes the following security issue:
* A flaw was found in the way socket buffers (skb) requiring TSO (TCP
segment offloading) were handled by the sfc driver. If the skb did not fit
within the minimum-size of the transmission queue, the network card could
repeatedly reset itself. A remote attacker could use this flaw to cause a
denial of service. (CVE-2012-3412, Important)
Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting
This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
Users should upgrade to these updated packages, which contain backported
patches to correct this issue, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.
kernel on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-3412|
RedHat Security Advisories: RHSA-2012:1323
RedHat Security Advisories: RHSA-2012:1324
RedHat Security Advisories: RHSA-2012:1347
RedHat Security Advisories: RHSA-2012:1375
RedHat Security Advisories: RHSA-2012:1401
RedHat Security Advisories: RHSA-2012:1430
SuSE Security Announcement: SUSE-SU-2012:1679 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1330 (Google Search)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.