ELA-981-1 firmware-nonfree security update

multiple vulnerabilities

2023-10-08
Packagefirmware-nonfree
Version20190114+really20220913-0+deb8u2 (jessie), 20190114+really20220913-0+deb9u2 (stretch)
Related CVEs CVE-2022-27635 CVE-2022-36351 CVE-2022-38076 CVE-2022-40964 CVE-2022-46329


Intel® released the INTEL-SA-00766 advisory about potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. The full advisory is available at [1]

[1] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html

This updated firmware-nonfree package includes the following firmware files:

The updated firmware files might need updated kernel to work. It is encouraged to verify whether the kernel loaded the updated firmware file and take additional measures if needed.

CVE-2022-27635

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow a privileged user to potentially enable escalation of
privilege via local access.

CVE-2022-36351

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow an unauthenticated user to potentially enable denial of
service via adjacent access.

CVE-2022-38076

Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow an authenticated user to potentially enable escalation
of privilege via local access.

CVE-2022-40964

Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM)
WiFi software may allow a privileged user to potentially enable escalation of
privilege via local access.

CVE-2022-46329

Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software
may allow a privileged user to potentially enable escalation of privilege via
local access.


For Debian 8 jessie, these problems have been fixed in version 20190114+really20220913-0+deb8u2.

For Debian 9 stretch, these problems have been fixed in version 20190114+really20220913-0+deb9u2.

We recommend that you upgrade your firmware-nonfree packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.