Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5bbce55c by Salvatore Bonaccorso at 2024-07-16T06:50:51+02:00
Track fixed version for firmware-nonfree issues fixed via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18287,7 +18287,7 @@ CVE-2023-47859 (Improper access control for some 
Intel(R) Wireless Bluetooth pro
 CVE-2023-47282 (Out-of-bounds write in Intel(R) Media SDK all versions and 
some Intel( ...)
        NOT-FOR-US: Intel
 CVE-2023-47210 (Improper input validation for some Intel(R) PROSet/Wireless 
WiFi softw ...)
-       - firmware-nonfree <unfixed>
+       - firmware-nonfree 20240610-1
        [bookworm] - firmware-nonfree <no-dsa> (Minor issue)
        [bullseye] - firmware-nonfree <no-dsa> (Minor issue)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
@@ -18373,7 +18373,7 @@ CVE-2023-38581 (Buffer overflow in Intel(R) Power 
Gadget software for Windows al
 CVE-2023-38420 (Improper conditions check in Intel(R) Power Gadget software 
for macOS  ...)
        NOT-FOR-US: Intel
 CVE-2023-38417 (Improper input validation for some Intel(R) PROSet/Wireless 
WiFi softw ...)
-       - firmware-nonfree <unfixed>
+       - firmware-nonfree 20240610-1
        [bookworm] - firmware-nonfree <no-dsa> (Minor issue)
        [bullseye] - firmware-nonfree <no-dsa> (Minor issue)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01039.html
@@ -47108,7 +47108,7 @@ CVE-2023-35121 (Improper access control in the Intel(R) 
oneAPI DPC++/C++ Compile
 CVE-2023-35062 (Improper access control in some Intel(R) DSA software before 
version 2 ...)
        NOT-FOR-US: Intel
 CVE-2023-35061 (Improper initialization for some Intel(R) PROSet/Wireless and 
Intel(R) ...)
-       - firmware-nonfree <unfixed> (bug #1064229)
+       - firmware-nonfree 20240610-1 (bug #1064229)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html
@@ -52921,7 +52921,7 @@ CVE-2023-52041 (An issue discovered in TOTOLINK X6000R 
V9.4.0cu.852_B20230719 al
 CVE-2023-51381
        REJECTED
 CVE-2023-4969 (A GPU kernel can read sensitive data from another GPU kernel 
(even fro ...)
-       - firmware-nonfree <unfixed> (bug #1061460)
+       - firmware-nonfree 20240610-1 (bug #1061460)
        [bookworm] - firmware-nonfree <postponed> (Minor issue, revisit when 
updates are available around March 2024)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        [buster] - firmware-nonfree <postponed> (Minor issue, revisit when 
updates are available)
@@ -125778,7 +125778,7 @@ CVE-2022-46646 (Exposure of sensitive information to 
an unauthorized actor for s
        NOT-FOR-US: Intel
 CVE-2022-46329 (Protection mechanism failure for some Intel(R) PROSet/Wireless 
WiFi so ...)
        {DLA-3596-1}
-       - firmware-nonfree <unfixed> (bug #1051892)
+       - firmware-nonfree 20240610-1 (bug #1051892)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -143394,7 +143394,7 @@ CVE-2022-40970
        RESERVED
 CVE-2022-40964 (Improper access control for some Intel(R) PROSet/Wireless WiFi 
and Kil ...)
        {DLA-3596-1}
-       - firmware-nonfree <unfixed> (bug #1051892)
+       - firmware-nonfree 20240610-1 (bug #1051892)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -152814,7 +152814,7 @@ CVE-2022-38087 (Exposure of resource to wrong sphere 
in BIOS firmware for some I
        NOT-FOR-US: Intel
 CVE-2022-38076 (Improper input validation in some Intel(R) PROSet/Wireless 
WiFi and Ki ...)
        {DLA-3596-1}
-       - firmware-nonfree <unfixed> (bug #1051892)
+       - firmware-nonfree 20240610-1 (bug #1051892)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -152832,7 +152832,7 @@ CVE-2022-36406
        RESERVED
 CVE-2022-36351 (Improper input validation in some Intel(R) PROSet/Wireless 
WiFi and Ki ...)
        {DLA-3596-1}
-       - firmware-nonfree <unfixed> (bug #1051892)
+       - firmware-nonfree 20240610-1 (bug #1051892)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html
@@ -182636,7 +182636,7 @@ CVE-2022-1041 (In Zephyr bluetooth mesh core stack, 
an out-of-bound write vulner
        NOT-FOR-US: Zyphyr
 CVE-2022-27635 (Improper access control for some Intel(R) PROSet/Wireless WiFi 
and Kil ...)
        {DLA-3596-1}
-       - firmware-nonfree <unfixed> (bug #1051892)
+       - firmware-nonfree 20240610-1 (bug #1051892)
        [bookworm] - firmware-nonfree <no-dsa> (Non-free not supported)
        [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bbce55cf8ee5532c5c523d3ad68891b4b4dcec6

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bbce55cf8ee5532c5c523d3ad68891b4b4dcec6
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to