[Git][security-tracker-team/security-tracker][master] Reverted the triage result for firmware-nonfree in strecth. It was concluded...

Ola Lundqvist (@opal) opal at debian.org
Fri Jun 25 07:14:54 BST 2021



Ola Lundqvist pushed to branch master at Debian Security Tracker / security-tracker


Commits:
24adab4c by Ola Lundqvist at 2021-06-25T08:14:33+02:00
Reverted the triage result for firmware-nonfree in strecth. It was concluded based on a false assumption.

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -56580,7 +56580,6 @@ CVE-2020-24588 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
 	- linux 5.10.46-1
 	[buster] - linux 4.19.194-1
 	- firmware-nonfree <unfixed>
-	[stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
 	NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
 	NOTE: https://www.fragattacks.com/
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56592,13 +56591,11 @@ CVE-2020-24588 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.0b2b886492f0.I23dd5d685fe16d3b0ec8106e8f01b59f499dffed@changeid/
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.076543300172.I548e6e71f1ee9cad4b9a37bf212ae7db723587aa@changeid/
 	NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
-	NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
 CVE-2020-24587 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2,  ...)
 	{DLA-2690-1 DLA-2689-1}
 	- linux 5.10.46-1
 	[buster] - linux 4.19.194-1
 	- firmware-nonfree <unfixed>
-	[stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
 	NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
 	NOTE: https://www.fragattacks.com/
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56607,13 +56604,11 @@ CVE-2020-24587 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/
 	NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
-	NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
 CVE-2020-24586 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2,  ...)
 	{DLA-2690-1 DLA-2689-1}
 	- linux 5.10.46-1
 	[buster] - linux 4.19.194-1
 	- firmware-nonfree <unfixed>
-	[stretch] - firmware-nonfree <not-affected> (Vulnerable code not present)
 	NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
 	NOTE: https://www.fragattacks.com/
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -56622,7 +56617,6 @@ CVE-2020-24586 (The 802.11 standard that underpins Wi-Fi Protected Access (WPA,
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
 	NOTE: https://lore.kernel.org/linux-wireless/20210511200110.037aa5ca0390.I7bb888e2965a0db02a67075fcb5deb50eb7408aa@changeid/
 	NOTE: firmware-nonfree (iwlwifi-fw-2021-05-12) addressed the firmware part of the CVE
-	NOTE: At least in stretch the vulnerable code is not in firmware-nonfree, only in linux source.
 CVE-2020-24585 (An issue was discovered in the DTLS handshake implementation in wolfSS ...)
 	- wolfssl 4.5.0+dfsg-1 (bug #969663)
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/3219


=====================================
data/dla-needed.txt
=====================================
@@ -51,6 +51,8 @@ ffmpeg (Anton Gladky)
   NOTE: 20210607: won't just be dropped too, etc. etc. (lamby)
   NOTE: 20210621: WIP
 --
+firmware-nonfree
+--
 golang-1.7
   NOTE: 20210624: Need further checks whether any issues are important to solve or not.
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24adab4c66b7318e9a83dc239b115487a0c357e7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24adab4c66b7318e9a83dc239b115487a0c357e7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210625/2a66fee3/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list