diff options
author | Ben Hutchings <benh@debian.org> | 2017-09-20 20:30:55 +0000 |
---|---|---|
committer | Ben Hutchings <benh@debian.org> | 2017-09-20 20:30:55 +0000 |
commit | ce7fbae7041679c162f7b6b6c0df7d2864c6ede6 (patch) | |
tree | cc3d695ce4b4fc1c33415e6324fe6dfcdc41fe28 | |
parent | b1a8d85db94d9bc34d6e60538c17cb11c512bfca (diff) |
Delete a rogue byte
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5587 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | dsa-texts/4.9.30-2+deb9u5 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/dsa-texts/4.9.30-2+deb9u5 b/dsa-texts/4.9.30-2+deb9u5 index 6635a3b3..00faf02c 100644 --- a/dsa-texts/4.9.30-2+deb9u5 +++ b/dsa-texts/4.9.30-2+deb9u5 @@ -141,7 +141,7 @@ CVE-2017-1000251 / #875881 CVE-2017-1000252 (stretch only) - Jan H. Schoe¶nherr of Amazon reported that the KVM implementation + Jan H. Schoenherr of Amazon reported that the KVM implementation for Intel x86 processors did not correctly validate interrupt injection requests. A local user with permission to use KVM could use this for denial of service. |