[Git][security-tracker-team/security-tracker][master] De-associate some Intel CVEs from firmware-nonfree
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Jun 30 20:07:36 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ef1a60e6 by Salvatore Bonaccorso at 2024-06-30T21:05:55+02:00
De-associate some Intel CVEs from firmware-nonfree
As correctly pointed out by Ben, according to
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
only CVE-2023-35061 is relevant for firmware-nonfree.
Link: https://bugs.debian.org/1064229
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -43369,45 +43369,25 @@ CVE-2023-35060 (Uncontrolled search path in some Intel(R) Battery Life Diagnosti
CVE-2023-35003 (Path transversal in some Intel(R) VROC software before version 8.0.8.1 ...)
NOT-FOR-US: Intel
CVE-2023-34983 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-34351 (Buffer underflow in some Intel(R) PCM software before version 202307 m ...)
NOT-FOR-US: Intel
CVE-2023-34315 (Incorrect default permissions in some Intel(R) VROC software before ve ...)
NOT-FOR-US: Intel
CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and Intel(R) ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-33870 (Insecure inherited permissions in some Intel(R) Ethernet tools and dri ...)
NOT-FOR-US: Intel
CVE-2023-32651 (Improper validation of specified type of input for some Intel(R) PROSe ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-32647 (Improper access control in some Intel(R) XTU software before version 7 ...)
NOT-FOR-US: Intel
CVE-2023-32646 (Uncontrolled search path element in some Intel(R) VROC software before ...)
NOT-FOR-US: Intel
CVE-2023-32644 (Protection mechanism failure for some Intel(R) PROSet/Wireless and Int ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-32642 (Insufficient adherence to expected conventions for some Intel(R) PROSe ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-32618 (Uncontrolled search path in some Intel(R) oneAPI Toolkit and component ...)
NOT-FOR-US: Intel
CVE-2023-32282 (Race condition in BIOS firmware for some Intel(R) Processors may allow ...)
@@ -43423,17 +43403,9 @@ CVE-2023-30767 (Improper buffer restrictions in Intel(R) Optimization for Tensor
CVE-2023-29153 (Uncontrolled resource consumption for some Intel(R) SPS firmware befor ...)
NOT-FOR-US: Intel
CVE-2023-28720 (Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-28374 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-49721 (An insecure default to allow UEFI Shell in EDK2 was left enabled in LX ...)
- lxd <not-affected> (Debian uses OVMF as packaged/fixed in the EDK2 package)
- incus <not-affected> (Debian uses OVMF as packaged/fixed in the EDK2 package)
@@ -99602,17 +99574,9 @@ CVE-2023-27382 (Incorrect default permissions in the Audio Service for some Inte
CVE-2023-26587 (Improper input validation for the Intel(R) Easy Streaming Wizard softw ...)
NOT-FOR-US: Intel
CVE-2023-26586 (Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Kill ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-25951 (Improper input validation for some Intel(R) PROSet/Wireless and Intel( ...)
- - firmware-nonfree <unfixed> (bug #1064229)
- [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
- [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
- NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
- NOTE: Fixed upstream in linux-firmware/20231211
+ NOT-FOR-US: Intel
CVE-2023-25757 (Improper access control in some Intel(R) Unison(TM) software before ve ...)
NOT-FOR-US: Intel
CVE-2023-25174 (Improper access control in some Intel(R) Chipset Driver Software befor ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1a60e6664b0c8430a6b5e1916489a7a461d7ab
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1a60e6664b0c8430a6b5e1916489a7a461d7ab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240630/5d3ef2fe/attachment.htm>
More information about the debian-security-tracker-commits
mailing list