Debian DLA-3596-1:firmware-nonfree - LTS 安全更新

high Nessus 插件 ID 182408

简介

远程 Debian 主机上缺少一个或多个与安全性相关的更新。

描述

远程 Debian 10 主机上安装的程序包受到 dla-3596 公告中提及的多个漏洞影响。

- 某些 Intel(R) PROSet/Wireless WiFi 和 Killer(TM) WiFi 软件存在访问控制不当漏洞,特权用户可能利用此漏洞,通过本地访问权限实现权限升级。(CVE-2022-27635、CVE-2022-40964)

- 某些 Intel(R) PROSet/Wireless WiFi 和 Killer(TM) WiFi 软件存在输入验证不当漏洞,未经身份验证的用户可能利用此漏洞,通过邻近的访问权限造成拒绝服务。(CVE-2022-36351)

- 某些 Intel(R) PROSet/Wireless WiFi 和 Killer(TM) WiFi 软件中存在输入验证不当漏洞,经过身份验证的用户可能利用此漏洞,通过本地访问权限实现权限升级。(CVE-2022-38076)

- 某些 Intel(R) PROSet/Wireless WiFi 软件存在保护机制失败漏洞,特权用户可能利用此漏洞,通过本地访问权限实现权限升级。(CVE-2022-46329)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 firmware-nonfree 程序包。

对于 Debian 10 buster,已在 20190114+really20220913-0+deb10u2 版本中修复这些问题。

另见

https://security-tracker.debian.org/tracker/CVE-2022-40964

https://security-tracker.debian.org/tracker/CVE-2022-46329

https://packages.debian.org/source/buster/firmware-nonfree

http://www.nessus.org/u?42c4e444

https://security-tracker.debian.org/tracker/CVE-2022-27635

https://security-tracker.debian.org/tracker/CVE-2022-36351

https://security-tracker.debian.org/tracker/CVE-2022-38076

插件详情

严重性: High

ID: 182408

文件名: debian_DLA-3596.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2023/10/1

最近更新时间: 2025/1/22

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5

矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 分数来源: CVE-2022-38076

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 6.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:firmware-myricom, p-cpe:/a:debian:debian_linux:firmware-adi, p-cpe:/a:debian:debian_linux:firmware-amd-graphics, p-cpe:/a:debian:debian_linux:firmware-netronome, p-cpe:/a:debian:debian_linux:firmware-linux, p-cpe:/a:debian:debian_linux:firmware-ipw2x00, p-cpe:/a:debian:debian_linux:firmware-brcm80211, p-cpe:/a:debian:debian_linux:firmware-siano, p-cpe:/a:debian:debian_linux:firmware-libertas, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:firmware-iwlwifi, p-cpe:/a:debian:debian_linux:firmware-bnx2x, p-cpe:/a:debian:debian_linux:firmware-qcom-media, p-cpe:/a:debian:debian_linux:firmware-linux-nonfree, p-cpe:/a:debian:debian_linux:firmware-ralink, p-cpe:/a:debian:debian_linux:firmware-samsung, p-cpe:/a:debian:debian_linux:firmware-intelwimax, p-cpe:/a:debian:debian_linux:firmware-ti-connectivity, p-cpe:/a:debian:debian_linux:firmware-atheros, p-cpe:/a:debian:debian_linux:firmware-misc-nonfree, p-cpe:/a:debian:debian_linux:firmware-netxen, p-cpe:/a:debian:debian_linux:firmware-bnx2, p-cpe:/a:debian:debian_linux:firmware-realtek, p-cpe:/a:debian:debian_linux:firmware-intel-sound, p-cpe:/a:debian:debian_linux:firmware-cavium, p-cpe:/a:debian:debian_linux:firmware-qlogic, p-cpe:/a:debian:debian_linux:firmware-ivtv

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

易利用性: No known exploits are available

补丁发布日期: 2023/9/30

漏洞发布日期: 2023/8/11

参考资料信息

CVE: CVE-2022-27635, CVE-2022-36351, CVE-2022-38076, CVE-2022-40964, CVE-2022-46329