Although it's not a good idea to throw this on your production servers
unless you are willing to wear the possible consequences. Bug reports
are still coming in on 2.0.34pre15, they may not bite you. They may bite
you.
D
Tomasz Papszun wrote:
>
> On Tue, 19 May 1998, Henrik Nordstrom wrote:
>
> > > [kfree_skb+183/244] [ip_glue+308/472] [ip_defrag+837/860]
> > > [ip_rcv+380/1464] [def_callback2+38/44] [packet_rcv+177/188]
> >
> > Looks like you have a Linux TCP/IP kernel problem (or memory fault).
>
> Original messages (included in the question) are very similar to these
> after some quite new (from about a few weeks or a month ago) kind of
> Denial-of-Service attack on Linux (and M$ W*). Something like nestea2,
> overdrop and so on. Even kernel 2.0.33 is vulnerable.
>
> Which version of kernel have you?
> After applying some "pre-34" patch to 2.0.33, vulnerability disappeared at
> my server.
> For up-to-date patches look at
> ftp://ftp.uk.linux.org/pub/linux/alan/2.0.34pre/
> (at the moment there is patch-2.0.34pre15.gz from 17 May).
>
> Info how to patch, you'll find in README in main directory with kernel
> sources.
> Good luck! :-)
>
> Tomek
> -- Tomasz Papszun, Lodz, Poland tomek@lodz.tpsa.pl
-- -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GAT d- s++: a C++++$ UL++++B+++S+++C++H++U++V+++$ P+++$ L+++ E- W+++(--)$ N++ w++$>--- t+ 5++ X+() R+ tv b++++ DI+++ e- h-@ ------END GEEK CODE BLOCK------Received on Wed May 20 1998 - 11:02:57 MDT
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:40:15 MST