[Git][security-tracker-team/security-tracker][master] Update information on CVE-2023-28410/linux
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed May 24 10:33:59 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6e2e36d8 by Salvatore Bonaccorso at 2023-05-24T11:33:28+02:00
Update information on CVE-2023-28410/linux
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -9246,8 +9246,13 @@ CVE-2023-28648 (Osprey Pump Controller version 1.01 inputs passed to a GET param
CVE-2023-28411 (Double free in some Intel(R) Server Board BMC firmware before version ...)
NOT-FOR-US: Intel
CVE-2023-28410 (Improper restriction of operations within the bounds of a memory buffe ...)
- - linux <unfixed>
+ - linux 5.17.3-1
+ [bullseye] - linux 5.10.113-1
+ [buster] - linux <not-affected> (Vulnerable code not present)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
+ NOTE: Fixed by: https://git.kernel.org/linus/661412e301e2ca86799aa4f400d1cf0bd38c57c6 (5.19-rc1)
+ NOTE: http://blog.pi3.com.pl/?p=931
+ NOTE: http://site.pi3.com.pl/adv/CVE-2023-28410_i915.txt
CVE-2023-28404
RESERVED
CVE-2023-28403
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e2e36d8ce81753624027bdd1da094d3db4fcd0c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e2e36d8ce81753624027bdd1da094d3db4fcd0c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230524/1f73e824/attachment.htm>
More information about the debian-security-tracker-commits
mailing list