Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f3bcd87d by Salvatore Bonaccorso at 2024-02-14T23:02:21+01:00
Add new set of firmware-nonfree CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -250,31 +250,55 @@ CVE-2023-35121 (Improper access control in some Intel(R) 
oneAPI DPC++/C++ Compil
 CVE-2023-35062 (Improper access control in some Intel(R) DSA software before 
version 2 ...)
        NOT-FOR-US: Intel
 CVE-2023-35061 (Improper initialization for some Intel(R) PROSet/Wireless and 
Intel(R) ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-35060 (Uncontrolled search path in some Intel(R) Battery Life 
Diagnostic Tool ...)
        NOT-FOR-US: Intel
 CVE-2023-35003 (Path transversal in some Intel(R) VROC software before version 
8.0.8.1 ...)
        NOT-FOR-US: Intel
 CVE-2023-34983 (Improper input validation for some Intel(R) PROSet/Wireless 
and Intel( ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-34351 (Buffer underflow in some Intel(R) PCM software before version 
202307 m ...)
        NOT-FOR-US: Intel
 CVE-2023-34315 (Incorrect default permissions in some Intel(R) VROC software 
before ve ...)
        NOT-FOR-US: Intel
 CVE-2023-33875 (Improper access control for some Intel(R) PROSet/Wireless and 
Intel(R) ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-33870 (Insecure inherited permissions in some Intel(R) Ethernet tools 
and dri ...)
        NOT-FOR-US: Intel
 CVE-2023-32651 (Improper validation of specified type of input for some 
Intel(R) PROSe ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-32647 (Improper access control in some Intel(R) XTU software before 
version 7 ...)
        NOT-FOR-US: Intel
 CVE-2023-32646 (Uncontrolled search path element in some Intel(R) VROC 
software before ...)
        NOT-FOR-US: Intel
 CVE-2023-32644 (Protection mechanism failure for some Intel(R) PROSet/Wireless 
and Int ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-32642 (Insufficient adherence to expected conventions for some 
Intel(R) PROSe ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-32618 (Uncontrolled search path in some Intel(R) oneAPI Toolkit and 
component ...)
        NOT-FOR-US: Intel
 CVE-2023-32280 (Insufficiently protected credentials in some Intel(R) Server 
Product O ...)
@@ -288,9 +312,17 @@ CVE-2023-30767 (Improper buffer restrictions in Intel(R) 
Optimization for Tensor
 CVE-2023-29153 (Uncontrolled resource consumption for some Intel(R) SPS 
firmware befor ...)
        TODO: check
 CVE-2023-28720 (Improper initialization for some Intel(R) PROSet/Wireless and 
Intel(R) ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-28374 (Improper input validation for some Intel(R) PROSet/Wireless 
and Intel( ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-49721
        - lxd <unfixed>
        NOTE: https://www.openwall.com/lists/oss-security/2024/02/14/4
@@ -55881,9 +55913,17 @@ CVE-2023-27382 (Incorrect default permissions in the 
Audio Service for some Inte
 CVE-2023-26587 (Improper input validation for the Intel(R) Easy Streaming 
Wizard softw ...)
        NOT-FOR-US: Intel
 CVE-2023-26586 (Uncaught exception for some Intel(R) PROSet/Wireless and 
Intel(R) Kill ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-25951 (Improper input validation for some Intel(R) PROSet/Wireless 
and Intel( ...)
-       TODO: check
+       - firmware-nonfree <unfixed>
+       [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
+       NOTE: Fixed upstream in linux-firmware/20231211
 CVE-2023-25757 (Improper access control in some Intel(R) Unison(TM) software 
before ve ...)
        NOT-FOR-US: Intel
 CVE-2023-25174 (Improper access control in some Intel(R) Chipset Driver 
Software befor ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f3bcd87da10c12c549508a5bef44325ab6c137c0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f3bcd87da10c12c549508a5bef44325ab6c137c0
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to