[Git][security-tracker-team/security-tracker][master] Track fixed version for firmware-nonfree issues fixed via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jul 16 06:06:39 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5bbce55c by Salvatore Bonaccorso at 2024-07-16T06:50:51+02:00
Track fixed version for firmware-nonfree issues fixed via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18287,7 +18287,7 @@ CVE-2023-47859 (Improper access control for some Intel(R) Wireless Bluetooth pro
 CVE-2023-47282 (Out-of-bounds write in Intel(R) Media SDK all versions and some Intel( ...)
 	NOT-FOR-US: Intel
 CVE-2023-47210 (Improper input validation for some Intel(R) PROSet/Wireless WiFi softw ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree 20240610-1
 	[bookworm] - firmware-nonfree <no-dsa> (Minor issue)
 	[bullseye] - firmware-nonfree <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
@@ -18373,7 +18373,7 @@ CVE-2023-38581 (Buffer overflow in Intel(R) Power Gadget software for Windows al
 CVE-2023-38420 (Improper conditions check in Intel(R) Power Gadget software for macOS  ...)
 	NOT-FOR-US: Intel
 CVE-2023-38417 (Improper input validation for some Intel(R) PROSet/Wireless WiFi softw ...)
-	- firmware-nonfree <unfixed>
+	- firmware-nonfree 20240610-1
 	[bookworm] - firmware-nonfree <no-dsa> (Minor issue)
 	[bullseye] - firmware-nonfree <no-dsa> (Minor issue)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
@@ -47108,7 +47108,7 @@ CVE-2023-35121 (Improper access control in the Intel(R) oneAPI DPC++/C++ Compile
 CVE-2023-35062 (Improper access control in some Intel(R) DSA software before version 2 ...)
 	NOT-FOR-US: Intel
 CVE-2023-35061 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
-	- firmware-nonfree <unfixed> (bug #1064229)
+	- firmware-nonfree 20240610-1 (bug #1064229)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
@@ -52921,7 +52921,7 @@ CVE-2023-52041 (An issue discovered in TOTOLINK X6000R V9.4.0cu.852_B20230719 al
 CVE-2023-51381
 	REJECTED
 CVE-2023-4969 (A GPU kernel can read sensitive data from another GPU kernel (even fro ...)
-	- firmware-nonfree <unfixed> (bug #1061460)
+	- firmware-nonfree 20240610-1 (bug #1061460)
 	[bookworm] - firmware-nonfree <postponed> (Minor issue, revisit when updates are available around March 2024)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[buster] - firmware-nonfree <postponed> (Minor issue, revisit when updates are available)
@@ -125778,7 +125778,7 @@ CVE-2022-46646 (Exposure of sensitive information to an unauthorized actor for s
 	NOT-FOR-US: Intel
 CVE-2022-46329 (Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi so ...)
 	{DLA-3596-1}
-	- firmware-nonfree <unfixed> (bug #1051892)
+	- firmware-nonfree 20240610-1 (bug #1051892)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -143394,7 +143394,7 @@ CVE-2022-40970
 	RESERVED
 CVE-2022-40964 (Improper access control for some Intel(R) PROSet/Wireless WiFi and Kil ...)
 	{DLA-3596-1}
-	- firmware-nonfree <unfixed> (bug #1051892)
+	- firmware-nonfree 20240610-1 (bug #1051892)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -152814,7 +152814,7 @@ CVE-2022-38087 (Exposure of resource to wrong sphere in BIOS firmware for some I
 	NOT-FOR-US: Intel
 CVE-2022-38076 (Improper input validation in some Intel(R) PROSet/Wireless WiFi and Ki ...)
 	{DLA-3596-1}
-	- firmware-nonfree <unfixed> (bug #1051892)
+	- firmware-nonfree 20240610-1 (bug #1051892)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -152832,7 +152832,7 @@ CVE-2022-36406
 	RESERVED
 CVE-2022-36351 (Improper input validation in some Intel(R) PROSet/Wireless WiFi and Ki ...)
 	{DLA-3596-1}
-	- firmware-nonfree <unfixed> (bug #1051892)
+	- firmware-nonfree 20240610-1 (bug #1051892)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -182636,7 +182636,7 @@ CVE-2022-1041 (In Zephyr bluetooth mesh core stack, an out-of-bound write vulner
 	NOT-FOR-US: Zyphyr
 CVE-2022-27635 (Improper access control for some Intel(R) PROSet/Wireless WiFi and Kil ...)
 	{DLA-3596-1}
-	- firmware-nonfree <unfixed> (bug #1051892)
+	- firmware-nonfree 20240610-1 (bug #1051892)
 	[bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
 	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bbce55cf8ee5532c5c523d3ad68891b4b4dcec6

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bbce55cf8ee5532c5c523d3ad68891b4b4dcec6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240716/e6d5bc6d/attachment.htm>


More information about the debian-security-tracker-commits mailing list