[kernel-sec-discuss] r1633 - active

Michael Gilbert gilbert-guest at alioth.debian.org
Fri Dec 4 13:27:07 UTC 2009


Author: gilbert-guest
Date: 2009-12-04 13:27:07 +0000 (Fri, 04 Dec 2009)
New Revision: 1633

Removed:
   active/CVE-2009-potential-buffer-overflows-in-net
Log:
remove issue (coding error; no known security implications)

Deleted: active/CVE-2009-potential-buffer-overflows-in-net
===================================================================
--- active/CVE-2009-potential-buffer-overflows-in-net	2009-12-04 13:26:58 UTC (rev 1632)
+++ active/CVE-2009-potential-buffer-overflows-in-net	2009-12-04 13:27:07 UTC (rev 1633)
@@ -1,13 +0,0 @@
-Candidate: need to request one
-Description:
- some wrong sizeof allocations could potentially allow buffer overflows
-References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=b607bd900051efc3308c4edc65dd98b34b230021
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.32-rc2) [b607bd900051efc3308c4edc65dd98b34b230021]
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:




More information about the kernel-sec-discuss mailing list