From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.0) Gecko/20020605
Description of problem:
Send a 0 byte UDP packet to the port CIPe is listening to and CIPE will crash.
The kernel has to be rebooted so that the CIPE link can be brought up again.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. setup CIPE to listen to port X at IP Y
2. from any host, do "nmap -p0 -sU -p X Y". This will send a 0 byte UDP packet
to the port CIPE is listening on. You do not have to go through the CIPE link.
Actual Results: Kernel is unable to handle paging request. That is, it crashes.
Expected Results: Log message by ciped: "Got short UDP packet" and the packet
CIPE 1.5.3 does not have this problem. Its configuration format is the same as
1.4.5 and can communicate with 1.4.5-based hosts.
*** Bug 66531 has been marked as a duplicate of this bug. ***
Note that 1.5.4 is out now and that it includes fixes to other problems
including improved MTU fixes and NAT through CIPE fixes.
I'm pretty sure this is fixed in 2.4.18-10
I just tested it with 2.4.18-10 and this is *NOT* fixed. I know there is a
patch about cipe that concerns this problem but the *daemon* must be upgraded,
not the kernel.
Please confirm the existence of this bug by testing yourself with the command I
posted in the original message: nmap -P0 -sU -p <ciped-cb port> <ciped-cb host>
My test box seems fine. However I don't want to close this without being
Red Hat apologizes that these issues have not been resolved yet. We do want to
make sure that no important bugs slip through the cracks.
Red Hat Linux 7.3 and Red Hat Linux 9 are no longer supported by Red Hat, Inc.
They are maintained by the Fedora Legacy project (http://www.fedoralegacy.org/)
for security updates only. If this is a security issue, please reassign to the
'Fedora Legacy' product in bugzilla. Please note that Legacy security update
support for these products will stop on December 31st, 2006.
If this is not a security issue, please check if this issue is still present
in a current Fedora Core release. If so, please change the product and version
to match, and check the box indicating that the requested information has been
If you are currently still running Red Hat Linux 7.3 or 9, please note that
Fedora Legacy security update support for these products will stop on December
31st, 2006. You are strongly advised to upgrade to a current Fedora Core release
or Red Hat Enterprise Linux or comparable. Some information on which option may
be right for you is available at http://www.redhat.com/rhel/migrate/redhatlinux/.
Any bug still open against Red Hat Linux 7.3 or 9 at the end of 2006 will be
closed 'CANTFIX'. Again, if this bug still exists in a current release, or is a
security issue, please change the product as necessary. We thank you for your
help, and apologize again that we haven't handled these issues to this point.
Red Hat Linux is no longer supported by Red Hat, Inc. If you are still
running Red Hat Linux, you are strongly advised to upgrade to a
current Fedora Core release or Red Hat Enterprise Linux or comparable.
Some information on which option may be right for you is available at
Closing as CANTFIX.