[Git][security-tracker-team/security-tracker][master] Add Debian bug reference for firmware-nonfree issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Feb 18 19:52:13 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0c26b647 by Salvatore Bonaccorso at 2024-02-18T20:51:33+01:00
Add Debian bug reference for firmware-nonfree issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -562,7 +562,7 @@ CVE-2023-35121 (Improper access control in some Intel(R) oneAPI DPC++/C++ Compil
CVE-2023-35062 (Improper access control in some Intel(R) DSA software before version 2 ...)
NOT-FOR-US: Intel
CVE-2023-35061 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -573,7 +573,7 @@ CVE-2023-35060 (Uncontrolled search path in some Intel(R) Battery Life Diagnosti
CVE-2023-35003 (Path transversal in some Intel(R) VROC software before version 8.0.8.1 ...)
NOT-FOR-US: Intel
CVE-2023-34983 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -584,7 +584,7 @@ CVE-2023-34351 (Buffer underflow in some Intel(R) PCM software before version 20
CVE-2023-34315 (Incorrect default permissions in some Intel(R) VROC software before ve ...)
NOT-FOR-US: Intel
CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and Intel(R) ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -593,7 +593,7 @@ CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and In
CVE-2023-33870 (Insecure inherited permissions in some Intel(R) Ethernet tools and dri ...)
NOT-FOR-US: Intel
CVE-2023-32651 (Improper validation of specified type of input for some Intel(R) PROSe ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -604,14 +604,14 @@ CVE-2023-32647 (Improper access control in some Intel(R) XTU software before ver
CVE-2023-32646 (Uncontrolled search path element in some Intel(R) VROC software before ...)
NOT-FOR-US: Intel
CVE-2023-32644 (Protection mechanism failure for some Intel(R) PROSet/Wireless and Int ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
NOTE: Fixed upstream in linux-firmware/20231211
CVE-2023-32642 (Insufficient adherence to expected conventions for some Intel(R) PROSe ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -630,14 +630,14 @@ CVE-2023-30767 (Improper buffer restrictions in Intel(R) Optimization for Tensor
CVE-2023-29153 (Uncontrolled resource consumption for some Intel(R) SPS firmware befor ...)
NOT-FOR-US: Intel
CVE-2023-28720 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
NOTE: Fixed upstream in linux-firmware/20231211
CVE-2023-28374 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
@@ -56295,14 +56295,14 @@ CVE-2023-27382 (Incorrect default permissions in the Audio Service for some Inte
CVE-2023-26587 (Improper input validation for the Intel(R) Easy Streaming Wizard softw ...)
NOT-FOR-US: Intel
CVE-2023-26586 (Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Kill ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
NOTE: Fixed upstream in linux-firmware/20231211
CVE-2023-25951 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed>
+ - firmware-nonfree <unfixed> (bug #1064229)
[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
[buster] - firmware-nonfree <no-dsa> (non-free not supported)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c26b647989a75ca4a22985976a911ed4cd84672
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0c26b647989a75ca4a22985976a911ed4cd84672
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240218/78eaac41/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list