[Git][security-tracker-team/security-tracker][master] Reverted the triage result for firmware-nonfree in strecth. It was concluded...
Ola Lundqvist (@opal)
opal at debian.org
Fri Jun 25 07:14:54 BST 2021
Ola Lundqvist pushed to branch master at Debian Security Tracker / security-tracker
Commits:
24adab4c by Ola Lundqvist at 2021-06-25T08:14:33+02:00
Reverted the triage result for firmware-nonfree in strecth. It was concluded based on a false assumption.
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -56580,7 +56580,6 @@ CVE-2020-24588 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
- linux 5.10.46-1
[buster] - linux 4.19.194-1
- firmware-nonfree <unfixed>
- [stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
NOTE: https://www.fragattacks.com/
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56592,13 +56591,11 @@ CVE-2020-24588 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.0b2b886492f0.I23dd5d685fe16d3b0ec8106e8f01b59f499dffed@changeid/
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.076543300172.I548e6e71f1ee9cad4b9a37bf212ae7db723587aa@changeid/
NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
- NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
CVE-2020-24587 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, ...)
{DLA-2690-1 DLA-2689-1}
- linux 5.10.46-1
[buster] - linux 4.19.194-1
- firmware-nonfree <unfixed>
- [stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
NOTE: https://www.fragattacks.com/
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56607,13 +56604,11 @@ CVE-2020-24587 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/
NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
- NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
CVE-2020-24586 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, ...)
{DLA-2690-1 DLA-2689-1}
- linux 5.10.46-1
[buster] - linux 4.19.194-1
- firmware-nonfree <unfixed>
- [stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
NOTE: https://www.fragattacks.com/
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56622,7 +56617,6 @@ CVE-2020-24586 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
NOTE: https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/
NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
- NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
CVE-2020-24585 (An issue was discovered in the DTLS handshake implementation in wolfSS ...)
- wolfssl 4.5.0+dfsg-1 (bug #969663)
NOTE: https://github.com/wolfSSL/wolfssl/pull/3219
=====================================
data/dla-needed.txt
=====================================
@@ -51,6 +51,8 @@ ffmpeg (Anton Gladky)
NOTE: 20210607: won't just be dropped too, etc. etc. (lamby)
NOTE: 20210621: WIP
--
+firmware-nonfree
+--
golang-1.7
NOTE: 20210624: Need further checks whether any issues are important to solve or not.
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24adab4c66b7318e9a83dc239b115487a0c357e7
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24adab4c66b7318e9a83dc239b115487a0c357e7
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210625/2a66fee3/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list