[Git][security-tracker-team/security-tracker][master] Update information on CVE-2023-28410/linux

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed May 24 10:33:59 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6e2e36d8 by Salvatore Bonaccorso at 2023-05-24T11:33:28+02:00
Update information on CVE-2023-28410/linux

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -9246,8 +9246,13 @@ CVE-2023-28648 (Osprey Pump Controller version 1.01 inputs passed to a GET param
 CVE-2023-28411 (Double free in some Intel(R) Server Board BMC firmware before version  ...)
 	NOT-FOR-US: Intel
 CVE-2023-28410 (Improper restriction of operations within the bounds of a memory buffe ...)
-	- linux <unfixed>
+	- linux 5.17.3-1
+	[bullseye] - linux 5.10.113-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
+	NOTE: Fixed by: https://git.kernel.org/linus/661412e301e2ca86799aa4f400d1cf0bd38c57c6 (5.19-rc1)
+	NOTE: http://blog.pi3.com.pl/?p=931
+	NOTE: http://site.pi3.com.pl/adv/CVE-2023-28410_i915.txt
 CVE-2023-28404
 	RESERVED
 CVE-2023-28403



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e2e36d8ce81753624027bdd1da094d3db4fcd0c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e2e36d8ce81753624027bdd1da094d3db4fcd0c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230524/1f73e824/attachment.htm>


More information about the debian-security-tracker-commits mailing list