Launchpad has imported 10 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3412.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2012-07-31T13:27:49+00:00 Petr wrote: A peer (or local user) may cause TCP to use a nominal MSS of as little as 88 (actual MSS of 76 with timestamps). Given that we have a sufficiently prodigious local sender and the peer ACKs quickly enough, it is nevertheless possible to grow the window for such a connection to the point that we will try to send just under 64K at once. This results in a single skb that expands to 861 segments. In some drivers with TSO support, such an skb will require hundreds of DMA descriptors; a substantial fraction of a TX ring or even more than a full ring. The TX queue selected for the skb may stall and trigger the TX watchdog repeatedly (since the problem skb will be retried after the TX reset). Upstream patch: http://www.spinics.net/lists/netdev/msg206332.html References: http://seclists.org/oss-sec/2012/q3/171 Acknowledgements: Red Hat would like to thank Ben Hutchings of Solarflare (tm) for reporting this issue. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/0 ------------------------------------------------------------------------ On 2012-08-03T12:35:31+00:00 Petr wrote: Created kernel tracking bugs for this issue Affects: fedora-all [bug 845558] Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/1 ------------------------------------------------------------------------ On 2012-08-03T16:46:54+00:00 Petr wrote: Mitigation as recommended by Ben Hutchings ------------------------------------------ If all processes that may send on the sfc interface use Onload, or do not use TCP, the vulnerability does not exist. The vulnerability can otherwise be avoided by making a temporary configuration change. For an sfc interface named eth0, either: a. Increase the TX queue size: ethtool -G eth0 tx 4096 This can increase TX latency and memory usage. or: b. Disable TSO: ethtool -K eth0 tso off This can reduce TX throughput and/or increase CPU usage. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/2 ------------------------------------------------------------------------ On 2012-10-02T17:11:36+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: RHEV-H, V2V and Agents for RHEL-5 Via RHSA-2012:1324 https://rhn.redhat.com/errata/RHSA-2012-1324.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/4 ------------------------------------------------------------------------ On 2012-10-02T17:45:30+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:1323 https://rhn.redhat.com/errata/RHSA-2012-1323.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/5 ------------------------------------------------------------------------ On 2012-10-09T10:28:53+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 5.6 EUS - Server Only Via RHSA-2012:1347 https://rhn.redhat.com/errata/RHSA-2012-1347.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/6 ------------------------------------------------------------------------ On 2012-10-16T14:46:08+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1366 https://rhn.redhat.com/errata/RHSA-2012-1366.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/7 ------------------------------------------------------------------------ On 2012-10-18T16:46:58+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: RHEV-H and Agents for RHEL-6 Via RHSA-2012:1375 https://rhn.redhat.com/errata/RHSA-2012-1375.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/8 ------------------------------------------------------------------------ On 2012-10-23T18:11:32+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6.2 EUS - Server Only Via RHSA-2012:1401 https://rhn.redhat.com/errata/RHSA-2012-1401.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/9 ------------------------------------------------------------------------ On 2012-11-06T18:06:34+00:00 errata-xmlrpc wrote: This issue has been addressed in following products: Red Hat Enterprise Linux 6.1 EUS - Server Only Via RHSA-2012:1430 https://rhn.redhat.com/errata/RHSA-2012-1430.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/comments/10 ** Changed in: linux (Fedora) Status: Unknown => Fix Released ** Changed in: linux (Fedora) Importance: Unknown => High -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1034281 Title: CVE-2012-3412 Status in linux package in Ubuntu: Fix Released Status in linux package in Fedora: Fix Released Bug description: A peer (or local user) may cause TCP to use a nominal MSS of as little as 88 (actual MSS of 76 with timestamps). Given that we have a sufficiently prodigious local sender and the peer ACKs quickly enough, it is nevertheless possible to grow the window for such a connection to the point that we will try to send just under 64K at once. This results in a single skb that expands to 861 segments. In some drivers with TSO support, such an skb will require hundreds of DMA descriptors; a substantial fraction of a TX ring or even more than a full ring. The TX queue selected for the skb may stall and trigger the TX watchdog repeatedly (since the problem skb will be retried after the TX reset). Upstream patch: http://www.spinics.net/lists/netdev/msg206332.html References: http://seclists.org/oss-sec/2012/q3/171 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1034281/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp