** Changed in: intel
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1728762
Title:
Update iwlwifi firmware for 3160, 3168, 7260, 7265 and 7265D
To manage
This bug was fixed in the package linux-firmware - 1.169.1
---
linux-firmware (1.169.1) artful; urgency=medium
* CVE-2017-13080 and CVE-2017-13081 (LP: #1728762)
- iwlwifi: update firmwares for 3160, 3168, 7265D, 8000C and 8265
- iwlwifi: update firmwares for 3160, 3168,
This bug was fixed in the package linux-firmware - 1.127.24
---
linux-firmware (1.127.24) trusty; urgency=medium
* CVE-2017-13080 and CVE-2017-13081 (LP: #1728762)
- iwlwifi: update firmwares for 3160, 3168, 7260, 7265 and 7265D
-- Seth Forshee
This bug was fixed in the package linux-firmware - 1.127.24
---
linux-firmware (1.127.24) trusty; urgency=medium
* CVE-2017-13080 and CVE-2017-13081 (LP: #1728762)
- iwlwifi: update firmwares for 3160, 3168, 7260, 7265 and 7265D
-- Seth Forshee
This bug was fixed in the package linux-firmware - 1.157.14
---
linux-firmware (1.157.14) xenial; urgency=medium
* CVE-2017-13080 and CVE-2017-13081 (LP: #1728762)
- iwlwifi: update firmwares for 3160, 3168, 7265D, 8000C and 8265
- iwlwifi: update firmwares for 3160, 3168,
This bug was fixed in the package linux-firmware - 1.157.14
---
linux-firmware (1.157.14) xenial; urgency=medium
* CVE-2017-13080 and CVE-2017-13081 (LP: #1728762)
- iwlwifi: update firmwares for 3160, 3168, 7265D, 8000C and 8265
- iwlwifi: update firmwares for 3160, 3168,
This bug was fixed in the package linux-firmware - 1.164.2
---
linux-firmware (1.164.2) zesty; urgency=medium
* Add audio topology firmware for Joule (LP: #1689497)
- UBUNTU: SAUCE: linux-firmware: audio topology binary for Joule
* CVE-2017-13080 and CVE-2017-13081 (LP:
Verified that the firmware files in each package match the files from
upstream which were identified as containing the CVE fixes.
** Tags added: verification-done-artful verification-done-trusty
verification-done-xenial verification-done-zesty
--
You received this bug notification because you
Hello quanxian, or anyone else affected,
Accepted linux-firmware into trusty-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/linux-
firmware/1.127.24 in a few hours, and then in the -proposed repository.
Please help us by testing this new package.
** Description changed:
+ SRU Justification
+
+ Impact: Intel wireless firmware WoWLAN functionality is vulnerable to
+ some CVEs from the KRACK attack vulnerabilities, CVE-2017-13080 and
+ CVE-2017-13081.
+
+ Fix: Updated firmware from Intel containing fixes for these
+ vulnerabilities.
+
+
Just reminder
The patch has been pushed into upstream
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-
firmware.git/commit/?id=8682bbcafc43792c71e210a1316b355bf17b3297
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The above one is for 3160, 3168, 7260, 7265 and 7265D
This is for 8265/8260
upstream: https://git.kernel.org/pub/scm/linux/kernel/git/firmware
/linux-firmware.git/commit/?id=8682bbcafc43792c71e210a1316b355bf17b3297
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: linux-firmware (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Changed in: linux-firmware (Ubuntu Xenial)
Status: In Progress => Fix Committed
** Changed in: linux-firmware (Ubuntu Zesty)
Status: In Progress => Fix Committed
** Changed in:
This bug was fixed in the package linux-firmware - 1.170
---
linux-firmware (1.170) bionic; urgency=medium
* Rebase against
git://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git
bf04291309d3169c0ad3b8db52564235bbd08e30
- cxgb4: update firmware to
You got right information from https://security-
center.intel.com/advisory.aspx?intelid=INTEL-SA-00101=en-fr.
You can find one line "the Wake-on-Wireless-LAN functionality (WoWLAN),
is a reasonable mitigation against CVE-2017-13080 and CVE-2017-13081".
If I am not wrong, CVE-2017-13080/13081
@quanxian - There are quite a few CVEs grouped together under the krack
attack moniker. Is the firmware vulnerable to all of these attacks? If
not, which specific CVE numbers are addressed? I tried finding this
information on the krack attack web site and from the NIST advisories,
but I couldn't
** Also affects: linux-firmware (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: linux-firmware (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-firmware (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects:
I will update the firmware as far as possible. Note that some of the
older kernels we support (4.4 for example) do not support new enough
ucode versions to benefit from the fixes to some of the ucode files, and
will remain vulnerable.
** Changed in: linux-firmware (Ubuntu)
Importance:
** Summary changed:
- [Feature] WIFI: firmware update
+ Update iwlwifi firmware for 3160, 3168, 7260, 7265 and 7265D
** Information type changed from Proprietary to Public
** Also affects: linux-firmware (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug
19 matches
Mail list logo