diff options
author | Raphael Geissert <geissert@debian.org> | 2009-12-04 13:27:07 +0000 |
---|---|---|
committer | Raphael Geissert <geissert@debian.org> | 2009-12-04 13:27:07 +0000 |
commit | 431431445e4d181a33d684b4b672b76a93560556 (patch) | |
tree | 4d2124f90e53aa71feb0ee041c7d79852700166c | |
parent | 3f6bc38e4a9c47e9aa275a0a412cef92cf80dd1c (diff) |
remove issue (coding error; no known security implications)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1633 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2009-potential-buffer-overflows-in-net | 13 |
1 files changed, 0 insertions, 13 deletions
diff --git a/active/CVE-2009-potential-buffer-overflows-in-net b/active/CVE-2009-potential-buffer-overflows-in-net deleted file mode 100644 index 75b7803d..00000000 --- a/active/CVE-2009-potential-buffer-overflows-in-net +++ /dev/null @@ -1,13 +0,0 @@ -Candidate: need to request one -Description: - some wrong sizeof allocations could potentially allow buffer overflows -References: - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=b607bd900051efc3308c4edc65dd98b34b230021 -Ubuntu-Description: -Notes: -Bugs: -upstream: released (2.6.32-rc2) [b607bd900051efc3308c4edc65dd98b34b230021] -linux-2.6: -2.6.18-etch-security: -2.6.24-etch-security: -2.6.26-lenny-security: |