{"id":"MGASA-2022-0065","summary":"Updated nonfree firmware packages fix security vulnerabilities","details":"This update provides new and updated nonfree firmwares and fixes at least\nthe following security issues:\n\nImproper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi\nmay allow an unauthenticated user to potentially enable escalation of\nprivilege via local access (CVE-2021-0066 / SA-00539).\n\nImproper input validation in firmware for some Intel(R) PROSet/Wireless\nWi-Fi may allow a privileged user to potentially enable information\ndisclosure via local access (CVE-2021-0072 / SA-00539).\n\nImproper Validation of Specified Index, Position, or Offset in Input in\nfirmware for some Intel(R) PROSet/Wireless Wi-Fi may allow a privileged\nuser to potentially enable denial of service via local access\n(CVE-2021-0076 / SA-00539).\n\nImproper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi\nmay allow a privileged user to potentially enable escalation of privilege\nvia local access (CVE-2021-0161, CVE-2021-0168 / SA-00539).\n\nImproper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi may\nallow an unauthenticated user to potentially enable escalation of privilege\nvia local access (CVE-2021-0164 / SA-00539).\n\nImproper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi\nmay allow an unauthenticated user to potentially enable denial of service\nvia adjacent access (CVE-2021-0165 / SA-00539).\n\nExposure of Sensitive Information to an Unauthorized Actor in firmware for\nsome Intel(R) PROSet/Wireless Wi-Fi may allow a privileged user to potentially\nenable escalation of privilege via local access (CVE-2021-0166 / SA-00539).\n\nExposure of Sensitive Information to an Unauthorized Actor in firmware for\nsome Intel(R) PROSet/Wireless Wi-Fi may allow an authenticated user to\npotentially enable information disclosure via local access\n(CVE-2021-0170 / SA-00539).\n\nImproper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi\nmay allow an unauthenticated user to potentially enable denial of service via\nadjacent access (CVE-2021-0172 / SA-00539).\n\nImproper Validation of Consistency within input in firmware for some Intel(R)\nPROSet/Wireless Wi-Fi may allow a unauthenticated user to potentially enable\ndenial of service via adjacent access (CVE-2021-0173 / SA-00539).\n\nImproper Use of Validation Framework in firmware for some Intel(R) PROSet/\nWireless Wi-Fi may allow a unauthenticated user to potentially enable denial\nof service via adjacent access (CVE-2021-0174 / SA-00539).\n\nImproper Validation of Specified Index, Position, or Offset in Input in\nfirmware for some Intel(R) PROSet/Wireless Wi-Fi may allow an unauthenticated\nuser to potentially enable denial of service via adjacent access\n(CVE-2021-0175 / SA-00539).\n\nImproper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi\nmay allow a privileged user to potentially enable denial of service via local\naccess (CVE-2021-0176 / SA-00539).\n\nImproper conditions check in firmware for some Intel(R) Wireless Bluetooth(R)\nproducts may allow an authenticated user to potentially enable denial of service\nvia adjacent access (CVE-2021-33139 / SA-00604).\n\nImproper input validation in firmware for some Intel(R) Wireless Bluetooth(R)\nproducts may allow an authenticated user to potentially enable denial of service\nvia adjacent access (CVE-2021-33155 / SA-00604).\n\nFull list of firmware changes/updates:\n* kernel-firmware-nonfree:\n  - cnm: add chips&media wave521c firmware\n  - cxgb4: Update firmware to revision 1.26.6.0\n  - i915: Add DMC firmware v2.16 for ADL-P\n  - marvell: add CPT firmware images\n  - mediatek: add firmware for MT7916\n  - mediatek: update firmware for MT7915\n  - mediatek: update firmware for MT7921 bluetooth chip\n  - mediatek: update firmware for MT7921 WiFi device\n  - mediatek: Update MT8173 VPU firmware to v1.1.7\n  - Mellanox: Add new mlxsw_spectrum firmware xx.2010.1232\n  - QCA: Add Bluetooth nvm file for WCN685x\n  - QCA: Update Bluetooth WCN685x 2.0 firmware to 2.0.0-00609\n  - QCA: Update Bluetooth WCN685x 2.1 firmware to 2.1.0-00324\n  - WHENCE: add missing symlink for NanoPi R1\n\n* iwlwifi-firmware:\n  - add new FWs from core63-136 release\n  - add new FWs from core66-88 release\n  - update 9000-family firmwares to core66-88\n  - Update firmware file for Intel Bluetooth 9260, 9462, 9560,\n    AX200, AX201, AX210, AX211\n\n* radeon-firmware:\n  - amdgpu: update yellow carp dmcub firmware\n\n* rtlwifi-firmware:\n  - rtw88: 8822c: Update normal firmware to v9.9.11\n","modified":"2026-02-04T02:36:48.382255Z","published":"2022-02-15T20:50:31Z","related":["CVE-2021-0066","CVE-2021-0072","CVE-2021-0076","CVE-2021-0161","CVE-2021-0164","CVE-2021-0165","CVE-2021-0166","CVE-2021-0168","CVE-2021-0170","CVE-2021-0172","CVE-2021-0173","CVE-2021-0174","CVE-2021-0175","CVE-2021-0176","CVE-2021-33139","CVE-2021-33155"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0065.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30038"},{"type":"REPORT","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html"},{"type":"REPORT","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html"}],"affected":[{"package":{"name":"kernel-firmware-nonfree","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/kernel-firmware-nonfree?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20220209-1.mga8.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0065.json"}},{"package":{"name":"radeon-firmware","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/radeon-firmware?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20220209-1.mga8.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0065.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}