[Git][security-tracker-team/security-tracker][master] Add Debian bug reference for firmware-nonfree issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Feb 18 19:52:13 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0c26b647 by Salvatore Bonaccorso at 2024-02-18T20:51:33+01:00
Add Debian bug reference for firmware-nonfree issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -562,7 +562,7 @@ CVE-2023-35121 (Improper access control in some Intel(R) oneAPI DPC++/C++ Compil
 CVE-2023-35062 (Improper access control in some Intel(R) DSA software before version 2 ...)
 	NOT-FOR-US: Intel
 CVE-2023-35061 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -573,7 +573,7 @@ CVE-2023-35060 (Uncontrolled search path in some Intel(R) Battery Life Diagnosti
 CVE-2023-35003 (Path transversal in some Intel(R) VROC software before version 8.0.8.1 ...)
 	NOT-FOR-US: Intel
 CVE-2023-34983 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -584,7 +584,7 @@ CVE-2023-34351 (Buffer underflow in some Intel(R) PCM software before version 20
 CVE-2023-34315 (Incorrect default permissions in some Intel(R) VROC software before ve ...)
 	NOT-FOR-US: Intel
 CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and Intel(R) ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -593,7 +593,7 @@ CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and In
 CVE-2023-33870 (Insecure inherited permissions in some Intel(R) Ethernet tools and dri ...)
 	NOT-FOR-US: Intel
 CVE-2023-32651 (Improper validation of specified type of input for some Intel(R) PROSe ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -604,14 +604,14 @@ CVE-2023-32647 (Improper access control in some Intel(R) XTU software before ver
 CVE-2023-32646 (Uncontrolled search path element in some Intel(R) VROC software before ...)
 	NOT-FOR-US: Intel
 CVE-2023-32644 (Protection mechanism failure for some Intel(R) PROSet/Wireless and Int ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
 	NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-32642 (Insufficient adherence to expected conventions for some Intel(R) PROSe ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -630,14 +630,14 @@ CVE-2023-30767 (Improper buffer restrictions in Intel(R) Optimization for Tensor
 CVE-2023-29153 (Uncontrolled resource consumption for some Intel(R) SPS firmware befor ...)
 	NOT-FOR-US: Intel
 CVE-2023-28720 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
 	NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-28374 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -56295,14 +56295,14 @@ CVE-2023-27382 (Incorrect default permissions in the Audio Service for some Inte
 CVE-2023-26587 (Improper input validation for the Intel(R) Easy Streaming Wizard softw ...)
 	NOT-FOR-US: Intel
 CVE-2023-26586 (Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Kill ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
 	NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-25951 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree <unfixed> (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <no-dsa> (non-free not supported)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c26b647989a75ca4a22985976a911ed4cd84672

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c26b647989a75ca4a22985976a911ed4cd84672
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240218/78eaac41/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list