Debian Package Tracker
Register | Log in
Subscribe

firmware-nonfree

Choose email to subscribe with

general
  • source: firmware-nonfree (non-free-firmware)
  • version: 20250917-1
  • maintainer: Debian Kernel Team (archive) (DMD)
  • uploaders: Bastian Blank [DMD] – Salvatore Bonaccorso [DMD] – maximilian attems [DMD] – Ben Hutchings [DMD]
  • arch: all
  • std-ver: 4.3.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 20210315-3
  • oldstable: 20230210-5
  • old-bpo: 20250410-2~bpo12+1
  • stable: 20250410-2
  • stable-bpo: 20250808-1~bpo13+1
  • testing: 20250808-1
  • unstable: 20250917-1
versioned links
  • 20210315-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20230210-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20250410-2~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20250410-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20250808-1~bpo13+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20250808-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 20250917-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • firmware-amd-graphics (8 bugs: 0, 7, 1, 0)
  • firmware-atheros (3 bugs: 0, 3, 0, 0)
  • firmware-bnx2
  • firmware-bnx2x
  • firmware-brcm80211 (3 bugs: 0, 3, 0, 0)
  • firmware-cavium
  • firmware-cirrus
  • firmware-intel-graphics
  • firmware-intel-misc
  • firmware-intel-sound (1 bugs: 0, 1, 0, 0)
  • firmware-ipw2x00
  • firmware-ivtv
  • firmware-iwlwifi (15 bugs: 0, 15, 0, 0)
  • firmware-libertas
  • firmware-linux
  • firmware-linux-nonfree (4 bugs: 0, 1, 3, 0)
  • firmware-marvell-prestera
  • firmware-mediatek (1 bugs: 0, 1, 0, 0)
  • firmware-misc-nonfree (10 bugs: 0, 8, 2, 0)
  • firmware-myricom
  • firmware-netronome
  • firmware-netxen (1 bugs: 0, 1, 0, 0)
  • firmware-nvidia-graphics (1 bugs: 0, 1, 0, 0)
  • firmware-qcom-media
  • firmware-qcom-soc
  • firmware-qlogic
  • firmware-realtek (4 bugs: 0, 4, 0, 0)
  • firmware-samsung
  • firmware-siano (1 bugs: 0, 1, 0, 0)
  • firmware-ti-connectivity (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 20251011 high
A new upstream version 20251011 is available, you should consider packaging it.
Created: 2025-09-21 Last update: 2025-10-20 18:30
13 security issues in buster high

There are 13 open security issues in buster.

12 important issues:
  • CVE-2023-25951: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow a privileged user to potentially enable escalation of privilege via local access.
  • CVE-2023-26586: Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-28374: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-28720: Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access..
  • CVE-2023-32642: Insufficient adherence to expected conventions for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-32644: Protection mechanism failure for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-32651: Improper validation of specified type of input for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-33875: Improper access control for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via local access..
  • CVE-2023-34983: Improper input validation for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-35061: Improper initialization for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
  • CVE-2023-38417: Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-47210: Improper input validation for some Intel(R) PROSet/Wireless WiFi software for linux before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
1 issue postponed or untriaged:
  • CVE-2023-4969: (postponed; to be fixed through a stable update) A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
Created: 2024-05-02 Last update: 2024-05-22 17:48
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-10-20 Last update: 2025-10-20 19:31
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 20250917-2, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 5685596f2ddd9c4e6e1e694c017226a87f832528
Merge: b2c16d3 3c2cdcf
Author: Ben Hutchings <benh@debian.org>
Date:   Mon Oct 20 20:55:08 2025 +0200

    Merge branch 'fix-arm-mali-firmware' into 'debian/latest'
    
    misc-nonfree: Include all Arm Mali firmware
    
    See merge request kernel-team/firmware-nonfree!132

commit 3c2cdcf46c592fbbc1860c0619cf179b4ffd7626
Author: Diederik de Haas <didi.debian@cknow.org>
Date:   Thu Oct 16 13:22:20 2025 +0200

    misc-nonfree: Include all Arm Mali firmware
    
    Various new Arm Mali firmware files were added in upstream commit
    930ef9046e38 ("panthor: Add firmware for more Mali GPUs")
    
    Therefore extend the defines pattern to include them all.
    Also extend the copyright pattern in a similar vein as the new files are
    licensed under the same license terms as the existing file.
    
    Signed-off-by: Diederik de Haas <didi.debian@cknow.org>
Created: 2025-10-20 Last update: 2025-10-20 19:31
4 bugs tagged help in the BTS normal
The BTS contains 4 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2019-03-21 Last update: 2025-10-20 19:30
3 bugs tagged patch in the BTS normal
The BTS contains patches fixing 3 bugs (4 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-10-20 19:30
lintian reports 21 warnings normal
Lintian reports 21 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-10-16 Last update: 2025-10-16 06:32
AppStream hints: 1 warning for firmware-bnx2,firmware-intel-graphics,firmware-qlogic,firmware-nvidia-graphics,firmware-intel-sound,firmware-ipw2x00,firmware-amd-graphics,firmware-intel-misc,firmware-iwlwifi,firmware-samsung,firmware-realtek,firmware-libertas,firmware-ti-connectivity,firmware-mediatek,firmware-cavium,firmware-atheros,firmware-marvell-prestera,firmware-bnx2x,firmware-brcm80211,firmware-misc-nonfree,firmware-siano,firmware-myricom,firmware-qcom-soc,firmware-ivtv,firmware-cirrus,firmware-netronome,firmware-netxen normal
AppStream found metadata issues for packages:
  • firmware-ipw2x00: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2024-01-27 Last update: 2025-04-21 17:20
debian/patches: 1 patch to forward upstream low

Among the 4 debian patches available in version 20250917-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-12-20 Last update: 2025-10-16 07:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.3.0).
Created: 2023-05-16 Last update: 2025-10-16 01:32
No known security issue in bookworm wishlist

There are 13 open security issues in bookworm.

13 ignored issues:
  • CVE-2023-4969: A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
  • CVE-2022-27635: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
  • CVE-2022-36351: Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2022-38076: Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2022-40964: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
  • CVE-2022-46329: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
  • CVE-2023-35061: Improper initialization for the Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
  • CVE-2023-38417: Improper input validation for some Intel(R) PROSet/Wireless WiFi software before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2023-47210: Improper input validation for some Intel(R) PROSet/Wireless WiFi software for linux before version 23.20 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2024-23198: Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.
  • CVE-2024-24984: Improper input validation for some Intel(R) Wireless Bluetooth(R) products for Windows before version 23.40 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
  • CVE-2024-25563: Improper initialization in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi before version 23.40 may allow a privileged user to potentially enable information disclosure via local access.
  • CVE-2024-28049: Improper input validation in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi wireless products before version 23.40 may allow an unauthenticated user to enable denial of service via adjacent access.
Created: 2023-08-18 Last update: 2025-10-15 21:34
testing migrations
  • excuses:
    • Migration status for firmware-nonfree (20250808-1 to 20250917-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating firmware-nonfree would introduce bugs in testing: #1118195
    • Additional info:
    • ∙ ∙ Cannot be tested by piuparts (not a blocker) - (no link yet)
    • ∙ ∙ 5 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2025-10-15] Accepted firmware-nonfree 20250917-1 (source) into unstable (Ben Hutchings)
  • [2025-09-09] Accepted firmware-nonfree 20250808-1~bpo13+1 (all source) into stable-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2025-08-21] firmware-nonfree 20250808-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-15] Accepted firmware-nonfree 20250808-1 (source) into unstable (Ben Hutchings)
  • [2025-07-08] Accepted firmware-nonfree 20250708-1 (source) into experimental (Ben Hutchings)
  • [2025-07-08] Accepted firmware-nonfree 20250627-1 (source) into experimental (Ben Hutchings)
  • [2025-06-21] Accepted firmware-nonfree 20250613-1 (source) into experimental (Ben Hutchings)
  • [2025-06-19] Accepted firmware-nonfree 20250509-1 (source) into experimental (Ben Hutchings)
  • [2025-05-28] Accepted firmware-nonfree 20250410-2~bpo12+1 (source) into stable-backports (Ben Hutchings)
  • [2025-05-05] firmware-nonfree 20250410-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-24] Accepted firmware-nonfree 20250410-2 (source) into unstable (Ben Hutchings)
  • [2025-04-21] Accepted firmware-nonfree 20250410-1 (source) into unstable (Ben Hutchings)
  • [2025-04-15] Accepted firmware-nonfree 20250311-1 (source) into unstable (Ben Hutchings)
  • [2025-04-14] Accepted firmware-nonfree 20250211-1 (source) into unstable (Ben Hutchings)
  • [2025-04-13] Accepted firmware-nonfree 20250109-1 (source) into unstable (Ben Hutchings)
  • [2025-03-20] Accepted firmware-nonfree 20241210-1~bpo12+1 (source) into stable-backports (Ben Hutchings)
  • [2024-12-25] firmware-nonfree 20241210-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-19] Accepted firmware-nonfree 20241210-1 (source) into unstable (Ben Hutchings)
  • [2024-11-04] firmware-nonfree 20240909-2 MIGRATED to testing (Debian testing watch)
  • [2024-10-30] Accepted firmware-nonfree 20240909-2 (source) into unstable (Ben Hutchings)
  • [2024-10-07] Accepted firmware-nonfree 20240909-1 (source) into unstable (Ben Hutchings)
  • [2024-10-07] Accepted firmware-nonfree 20240811-1 (source) into unstable (Ben Hutchings)
  • [2024-09-06] Accepted firmware-nonfree 20240709-2~bpo12+1 (all source) into stable-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2024-09-06] firmware-nonfree 20240709-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-01] Accepted firmware-nonfree 20240709-2 (source) into unstable (Ben Hutchings)
  • [2024-08-01] firmware-nonfree 20240709-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-26] Accepted firmware-nonfree 20240709-1 (source) into unstable (Ben Hutchings)
  • [2024-07-21] firmware-nonfree 20240610-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-15] Accepted firmware-nonfree 20240610-1 (source) into unstable (Ben Hutchings)
  • [2024-06-30] Accepted firmware-nonfree 20230625-3~exp3 (source) into experimental (Ben Hutchings)
  • 1
  • 2
bugs [bug history graph]
  • all: 66 72
  • RC: 0
  • I&N: 50 52
  • M&W: 15 18
  • F&P: 1 2
  • patch: 3 4
  • help: 4
links
  • lintian (0, 21)
  • buildd: logs
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing