diff options
author | Jean-Pierre Giraud <jean-pierregiraud@neuf.fr> | 2020-10-19 13:06:21 +0000 |
---|---|---|
committer | Jean-Pierre Giraud <jean-pierregiraud@neuf.fr> | 2020-10-19 13:06:21 +0000 |
commit | 43f8d7b8b91b167696b5c84ec0911bab7b7073f2 (patch) | |
tree | 98b6cd0cb5823fc8abcf079c819e56903abb051e | |
parent | e2c0335aa1c5359e19a84832819a23d320d9e87d (diff) |
dsa-4774.wml, remove duplicated word
-rw-r--r-- | english/security/2020/dsa-4774.wml | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/english/security/2020/dsa-4774.wml b/english/security/2020/dsa-4774.wml index d6e99161ad5..a8c61027a64 100644 --- a/english/security/2020/dsa-4774.wml +++ b/english/security/2020/dsa-4774.wml @@ -19,8 +19,7 @@ denial of service or information leaks.</p> <p>Andy Nguyen discovered a flaw in the Bluetooth implementation. Stack memory is not properly initialised when handling certain AMP packets. A remote attacker in short distance knowing the victim's - Bluetooth device address address can retrieve kernel stack - information.</p></li> + Bluetooth device address can retrieve kernel stack information.</p></li> <li><a href="https://security-tracker.debian.org/tracker/CVE-2020-25211">CVE-2020-25211</a> |