Unrated severityNVD Advisory· Published Oct 3, 2012· Updated Apr 29, 2026
CVE-2012-3412
CVE-2012-3412
Description
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
Affected products
15cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- osv-coords10 versionspkg:rpm/opensuse/kernel-source&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS
< 4.8.13-1.1+ 9 more
- (no CPE)range: < 4.8.13-1.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
- (no CPE)range: < 3.0.101-108.90.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325cnvdExploitThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.htmlnvdBroken LinkMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1323.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1324.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1347.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1375.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1401.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-1430.htmlnvdThird Party Advisory
- www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30nvdVendor Advisory
- www.openwall.com/lists/oss-security/2012/08/03/4nvdMailing ListThird Party Advisory
- www.ubuntu.com/usn/USN-1567-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1568-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1572-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1575-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1577-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1578-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1579-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1580-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- www.suse.com/support/update/announcement/2012/suse-su-20121679-1.htmlnvdThird Party Advisory
- secunia.com/advisories/50633nvdBroken Link
- secunia.com/advisories/50732nvdBroken Link
- secunia.com/advisories/50811nvdBroken Link
- secunia.com/advisories/51193nvdBroken Link
News mentions
0No linked articles in our index yet.