diff options
author | Michael Gilbert <mgilbert@debian.org> | 2013-04-08 02:15:33 +0000 |
---|---|---|
committer | Michael Gilbert <mgilbert@debian.org> | 2013-04-08 02:15:33 +0000 |
commit | 644fe3662155f0f9cbce72415889a0fd5ac82a88 (patch) | |
tree | 5a0d9dc5fe00622e36f32fdc95f0bc5e7571de9c /data/CVE/list.2002 | |
parent | 9f673cb4a42a829086aad7c66dc907dbfc51709f (diff) |
include reference
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@21886 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/CVE/list.2002')
-rw-r--r-- | data/CVE/list.2002 | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/list.2002 b/data/CVE/list.2002 index d15819df71..1cc81ba9b7 100644 --- a/data/CVE/list.2002 +++ b/data/CVE/list.2002 @@ -21,6 +21,7 @@ CVE-2002-2439 NOTE: Any application using unguarded memory allocation would be susceptible to DoS anyway? NOTE: This should be addressed in jessie by getting this fixed in gcc 4.7, so that the archive is NOTE: properly rebuild with a fixed version from the start + NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2002-2439 CVE-2002-2438 RESERVED NOT-FOR-US: ancient linux 2.4 issue |