[LWN Logo]

Date: 4 Jun 1999 17:45:56 -0000
From: listmaster@locutus.calderasystems.com
To: announce@lists.calderasystems.com
Subject: Security Advisory Announcement

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		Kernel handling of IP options can crash machine
Advisory number: 	CSSA-1999:013.0
Issue date: 		1999 June 04
Cross reference: 
______________________________________________________________________________


1. Problem Description

   All Linux kernels up to version 2.2.9 have a bug
   in the handling of IP options that can be used to
   remotely crash the machine.

   An IP packet can contain a variable amount of extra information
   following the standard 20-byte header. These are called IP options.

   When receiving an IP packet with bogus options, all 2.2 kernels
   erroneously release the network buffer twice, causing memory
   corruption. This eventually leads to a system crash.

   This problem has been publicly disclosed on the bugtraq
   mailing list, and an exploit has been made available.
				   
2. Vulnerable Versions

   Systems:     OpenLinux 2.2
   Packages:    all Linux kernels up to linux-kernel-binary-2.2.5-2.i386.rpm
      
3. Solutions

   Upgrade to the latest kernel RPMS
   
   linux-kernel-binary-2.2.5-2.i386.rpm
   
4. Location of Fixed Packages

   The upgrade packages can be found on Caldera's FTP site at:

   ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/

   The corresponding source code package can be found at:

   ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS


5. Installing Fixed Packages

   Upgrade the affected packages with the following commands:

   rpm -U linux-kernel-binary-2.2.5-2.i386.rpm

   start lilo, and reboot after upgrade

   /sbin/lilo
   /sbin/reboot
   
6. Verification

   92fb578c5a06f1d06c2d6f581aa213fe  README
   89a277e6e14d65c4ac405b56f394117b  RPMS/linux-kernel-binary-2.2.5-2.i386.rpm
   370fd253c92a524aa3eb99e938174840  SRPMS/linux-2.2.5-2.src.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/news/security/index.html
  
   Additional documentation on this problem can be found in:
  
   http://www.geek-girl.com/bugtraq/1999_2/0604.html

8. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

______________________________________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBN1fFW+n+9R4958LpAQGgvQQApLrSs/eJAsj6BTJ4JXMcwTNfzYuPgQkA
jxaWZw7ehoC+mdmVDdnBKvEHduK3hbCtCWyqRZVQ9IgaK+WHKOf0RB9jpr9brCFO
6Kv4oh7DnbPrtcO0mVtq1sKaPSy0/w3vGlcGjDMy7d01o8VoGiIcFxpumLItkZPa
zd0PC4OeOfc=
=bUoJ
-----END PGP SIGNATURE-----
 --
Note: To learn how to use this list server, email a "help" command to
majordomo@lists.calderasystems.com.