summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <benh@debian.org>2017-09-20 20:30:55 +0000
committerBen Hutchings <benh@debian.org>2017-09-20 20:30:55 +0000
commitce7fbae7041679c162f7b6b6c0df7d2864c6ede6 (patch)
treecc3d695ce4b4fc1c33415e6324fe6dfcdc41fe28
parentb1a8d85db94d9bc34d6e60538c17cb11c512bfca (diff)
Delete a rogue byte
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5587 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--dsa-texts/4.9.30-2+deb9u52
1 files changed, 1 insertions, 1 deletions
diff --git a/dsa-texts/4.9.30-2+deb9u5 b/dsa-texts/4.9.30-2+deb9u5
index 6635a3b3..00faf02c 100644
--- a/dsa-texts/4.9.30-2+deb9u5
+++ b/dsa-texts/4.9.30-2+deb9u5
@@ -141,7 +141,7 @@ CVE-2017-1000251 / #875881
CVE-2017-1000252 (stretch only)
- Jan H. Schoe¶nherr of Amazon reported that the KVM implementation
+ Jan H. Schoenherr of Amazon reported that the KVM implementation
for Intel x86 processors did not correctly validate interrupt
injection requests. A local user with permission to use KVM could
use this for denial of service.

© 2014-2024 Faster IT GmbH | imprint | privacy policy