2006-02-07 01:41:22

by Chris Wright

[permalink] [raw]
Subject: Linux 2.6.15.3

We (the -stable team) are announcing the release of the 2.6.15.3 kernel.
This contains a single security fix (CVE-2006-0454) which can potentially
be used as remote DoS exploit.

The diffstat and short summary of the fixes are below.

I'll also be replying to this message with a copy of the patch between
2.6.15.2 and 2.6.15.3, as it is small enough to do so.

The updated 2.6.15.y git tree can be found at:
rsync://rsync.kernel.org/pub/scm/linux/kernel/git/chrisw/linux-2.6.15.y.git
and can be browsed at the normal kernel.org git web browser:
http://www.kernel.org/git/

thanks,
-chris

--------

Makefile | 2 +-
net/ipv4/icmp.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)

Summary of changes from v2.6.15.2 to v2.6.15.3
==============================================

Chris Wright:
Linux 2.6.15.3

Herbert Xu:
Fix extra dst release when ip_options_echo fails


2006-02-07 01:42:41

by Chris Wright

[permalink] [raw]
Subject: Re: Linux 2.6.15.3

diff --git a/Makefile b/Makefile
index 76a00d4..a88ae43 100644
--- a/Makefile
+++ b/Makefile
@@ -1,7 +1,7 @@
VERSION = 2
PATCHLEVEL = 6
SUBLEVEL = 15
-EXTRAVERSION = .2
+EXTRAVERSION = .3
NAME=Sliding Snow Leopard

# *DOCUMENTATION*
diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c
index 92e23b2..84de934 100644
--- a/net/ipv4/icmp.c
+++ b/net/ipv4/icmp.c
@@ -524,7 +524,7 @@ void icmp_send(struct sk_buff *skb_in, i
iph->tos;

if (ip_options_echo(&icmp_param.replyopts, skb_in))
- goto ende;
+ goto out_unlock;


/*