Errata ID | 315 |
---|---|
Date | 2018-11-21 |
Source package | firmware-nonfree |
Fixed in version | 20161130-4 |
Description | This update addresses the following issues: * The Broadcom Wi-Fi driver in the Linux kernel allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka internal bug 25662029. (CVE-2016-0801) * A remote code execution vulnerability in the Broadcom Wi-Fi firmware could enable a remote attacker to execute arbitrary code within the context of the Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote code execution in the context of the Wi-Fi SoC. (CVE-2017-0561) * Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue. (CVE-2017-9417) * Reinstallation of the pairwise key in the 4-way handshake (CVE-2017-13077) * Reinstallation of the group key in the 4-way handshake (CVE-2017-13078) * Reinstallation of the integrity group key in the 4-way handshake (CVE-2017-13079) * Reinstallation of the group key in the group key handshake (CVE-2017-13080) * Reinstallation of the integrity group key in the group key handshake (CVE-2017-13081) |
Additional notes | |
CVE ID | CVE-2016-0801 CVE-2017-0561 CVE-2017-9417 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 |
UCS Bug number | #48178 |