|Description||Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
[buster] - firmware-nonfree <no-dsa> (non-free not supported)
[stretch] - firmware-nonfree <no-dsa> (Minor Issue, May be considered if some major issue appear)
Fixed firmware blobs:
ibt-18-16-1.sfi: FW Build: REL17064 Release Version: 18.104.22.168
Not shipped in Debian: Wi-Fi 6 AX200, Wireless-AC 9560, Wireless-AC 9462, Wireless-AC 9461, Dual Band Wireless-AC 3165
Intel seems to have missed the update for ibt-12-16.sfi, last update from May 2019
Intel seems to have missed the update for ibt-11-5.sfi, last update from Jan 2019
There's no conclusive information which allows to track these, until something
gets confirmed by Intel, track as <undetermined>