CVE-2020-12313

NameCVE-2020-12313
DescriptionInsufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)stretch/non-free20161130-5vulnerable
buster/non-free20190114-2vulnerable
bullseye/non-free20201218-3vulnerable
sid/non-free20210208-3vulnerable
stretch/non-free (security)20190114-2~deb9u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firmware-nonfreesource(unstable)(unfixed)

Notes

[buster] - firmware-nonfree <no-dsa> (non-free not supported)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
Fixed firmware blobs:
ibt-18-16-1.sfi: FW Build: REL17064 Release Version: 22.20.0.3
ibt-hw-37.8.10-fw-22.50.19.14.f.bseq
Not shipped in Debian: Wi-Fi 6 AX200, Wireless-AC 9560, Wireless-AC 9462, Wireless-AC 9461, Dual Band Wireless-AC 3165
Intel seems to have missed the update for ibt-12-16.sfi, last update from May 2019
Intel seems to have missed the update for ibt-11-5.sfi, last update from Jan 2019

Search for package or bug name: Reporting problems