Author: dannf
Date: Sat Mar 31 20:41:43 2007
New Revision: 8407

Modified:
   dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
Log:
typo

Modified: 
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog
==============================================================================
--- 
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog   
    (original)
+++ 
dists/sarge-security/kernel/source/kernel-source-2.6.8-2.6.8/debian/changelog   
    Sat Mar 31 20:41:43 2007
@@ -39,7 +39,7 @@
     See CVE-2006-5754
   * unmap_hugepage_area-check-null-pte.dpatch
     [SECURITY] Fix a potential DoS (crash) in unmap_hugepage_area().
-    No kerel-image builds appear to compile this code, so this fix is only
+    No kernel-image builds appear to compile this code, so this fix is only
     for users that compile their own kernels with the Debian source and
     enable/use huge pages.
     See CVE-2005-4811

_______________________________________________
Kernel-svn-changes mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/kernel-svn-changes

Reply via email to