From listmaster@locutus.calderasystems.com Sat Jun 5 08:33:35 1999 From: listmaster@locutus.calderasystems.com To: announce@lists.calderasystems.com Date: 4 Jun 1999 17:45:56 -0000 Reply-To: info@calderasystems.com Subject: Security Advisory Announcement -----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: Kernel handling of IP options can crash machine Advisory number: CSSA-1999:013.0 Issue date: 1999 June 04 Cross reference: ______________________________________________________________________________ 1. Problem Description All Linux kernels up to version 2.2.9 have a bug in the handling of IP options that can be used to remotely crash the machine. An IP packet can contain a variable amount of extra information following the standard 20-byte header. These are called IP options. When receiving an IP packet with bogus options, all 2.2 kernels erroneously release the network buffer twice, causing memory corruption. This eventually leads to a system crash. This problem has been publicly disclosed on the bugtraq mailing list, and an exploit has been made available. 2. Vulnerable Versions Systems: OpenLinux 2.2 Packages: all Linux kernels up to linux-kernel-binary-2.2.5-2.i386.rpm 3. Solutions Upgrade to the latest kernel RPMS linux-kernel-binary-2.2.5-2.i386.rpm 4. Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS 5. Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -U linux-kernel-binary-2.2.5-2.i386.rpm start lilo, and reboot after upgrade /sbin/lilo /sbin/reboot 6. Verification 92fb578c5a06f1d06c2d6f581aa213fe README 89a277e6e14d65c4ac405b56f394117b RPMS/linux-kernel-binary-2.2.5-2.i386.rpm 370fd253c92a524aa3eb99e938174840 SRPMS/linux-2.2.5-2.src.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/news/security/index.html Additional documentation on this problem can be found in: http://www.geek-girl.com/bugtraq/1999_2/0604.html 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBN1fFW+n+9R4958LpAQGgvQQApLrSs/eJAsj6BTJ4JXMcwTNfzYuPgQkA jxaWZw7ehoC+mdmVDdnBKvEHduK3hbCtCWyqRZVQ9IgaK+WHKOf0RB9jpr9brCFO 6Kv4oh7DnbPrtcO0mVtq1sKaPSy0/w3vGlcGjDMy7d01o8VoGiIcFxpumLItkZPa zd0PC4OeOfc= =bUoJ -----END PGP SIGNATURE----- -- Note: To learn how to use this list server, email a "help" command to majordomo@lists.calderasystems.com.