summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRaphael Geissert <geissert@debian.org>2009-12-04 13:27:07 +0000
committerRaphael Geissert <geissert@debian.org>2009-12-04 13:27:07 +0000
commit431431445e4d181a33d684b4b672b76a93560556 (patch)
tree4d2124f90e53aa71feb0ee041c7d79852700166c
parent3f6bc38e4a9c47e9aa275a0a412cef92cf80dd1c (diff)
remove issue (coding error; no known security implications)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1633 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--active/CVE-2009-potential-buffer-overflows-in-net13
1 files changed, 0 insertions, 13 deletions
diff --git a/active/CVE-2009-potential-buffer-overflows-in-net b/active/CVE-2009-potential-buffer-overflows-in-net
deleted file mode 100644
index 75b7803d..00000000
--- a/active/CVE-2009-potential-buffer-overflows-in-net
+++ /dev/null
@@ -1,13 +0,0 @@
-Candidate: need to request one
-Description:
- some wrong sizeof allocations could potentially allow buffer overflows
-References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=b607bd900051efc3308c4edc65dd98b34b230021
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.32-rc2) [b607bd900051efc3308c4edc65dd98b34b230021]
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy