SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1923-1
Rating:             important
References:         #1195786 #1199459 #1199470 
Cross-References:   CVE-2021-26312 CVE-2021-26339 CVE-2021-26342
                    CVE-2021-26347 CVE-2021-26348 CVE-2021-26349
                    CVE-2021-26350 CVE-2021-26364 CVE-2021-26372
                    CVE-2021-26373 CVE-2021-26375 CVE-2021-26376
                    CVE-2021-26378 CVE-2021-26388 CVE-2021-33139
                    CVE-2021-33155 CVE-2021-46744
CVSS scores:
                    CVE-2021-26312 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-26339 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26339 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26342 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-26342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
                    CVE-2021-26347 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26348 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2021-26349 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2021-26350 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26364 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26372 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26373 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26375 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26376 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26378 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-26388 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-46744 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
                    CVE-2021-46744 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that fixes 17 vulnerabilities is now available.

Description:

   This update for kernel-firmware fixes the following issues:

   Update to version 20220411 (git commit f219d616f42b, bsc#1199459):

   - CVE-2021-26373, CVE-2021-26347, CVE-2021-26376, CVE-2021-26350,
     CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339,
     CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349,
     CVE-2021-26364, CVE-2021-26312: Update AMD cpu microcode


   Update to version 20220309 (git commit cd01f857da28, bsc#1199470):

   - CVE-2021-46744: Ciphertext Side Channels on AMD SEV


   Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786):

   - CVE-2021-33139, CVE-2021-33155: Improper conditions check in the
     firmware for some Intel Wireless Bluetooth and Killer Bluetooth products
     may allow an authenticated user to potentially cause denial of service
     via adjacent access.


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-1923=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1923=1



Package List:

   - openSUSE Leap 15.4 (noarch):

      kernel-firmware-20220509-150400.4.5.1
      kernel-firmware-all-20220509-150400.4.5.1
      kernel-firmware-amdgpu-20220509-150400.4.5.1
      kernel-firmware-ath10k-20220509-150400.4.5.1
      kernel-firmware-ath11k-20220509-150400.4.5.1
      kernel-firmware-atheros-20220509-150400.4.5.1
      kernel-firmware-bluetooth-20220509-150400.4.5.1
      kernel-firmware-bnx2-20220509-150400.4.5.1
      kernel-firmware-brcm-20220509-150400.4.5.1
      kernel-firmware-chelsio-20220509-150400.4.5.1
      kernel-firmware-dpaa2-20220509-150400.4.5.1
      kernel-firmware-i915-20220509-150400.4.5.1
      kernel-firmware-intel-20220509-150400.4.5.1
      kernel-firmware-iwlwifi-20220509-150400.4.5.1
      kernel-firmware-liquidio-20220509-150400.4.5.1
      kernel-firmware-marvell-20220509-150400.4.5.1
      kernel-firmware-media-20220509-150400.4.5.1
      kernel-firmware-mediatek-20220509-150400.4.5.1
      kernel-firmware-mellanox-20220509-150400.4.5.1
      kernel-firmware-mwifiex-20220509-150400.4.5.1
      kernel-firmware-network-20220509-150400.4.5.1
      kernel-firmware-nfp-20220509-150400.4.5.1
      kernel-firmware-nvidia-20220509-150400.4.5.1
      kernel-firmware-platform-20220509-150400.4.5.1
      kernel-firmware-prestera-20220509-150400.4.5.1
      kernel-firmware-qcom-20220509-150400.4.5.1
      kernel-firmware-qlogic-20220509-150400.4.5.1
      kernel-firmware-radeon-20220509-150400.4.5.1
      kernel-firmware-realtek-20220509-150400.4.5.1
      kernel-firmware-serial-20220509-150400.4.5.1
      kernel-firmware-sound-20220509-150400.4.5.1
      kernel-firmware-ti-20220509-150400.4.5.1
      kernel-firmware-ueagle-20220509-150400.4.5.1
      kernel-firmware-usb-network-20220509-150400.4.5.1
      ucode-amd-20220509-150400.4.5.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):

      kernel-firmware-all-20220509-150400.4.5.1
      kernel-firmware-amdgpu-20220509-150400.4.5.1
      kernel-firmware-ath10k-20220509-150400.4.5.1
      kernel-firmware-ath11k-20220509-150400.4.5.1
      kernel-firmware-atheros-20220509-150400.4.5.1
      kernel-firmware-bluetooth-20220509-150400.4.5.1
      kernel-firmware-bnx2-20220509-150400.4.5.1
      kernel-firmware-brcm-20220509-150400.4.5.1
      kernel-firmware-chelsio-20220509-150400.4.5.1
      kernel-firmware-dpaa2-20220509-150400.4.5.1
      kernel-firmware-i915-20220509-150400.4.5.1
      kernel-firmware-intel-20220509-150400.4.5.1
      kernel-firmware-iwlwifi-20220509-150400.4.5.1
      kernel-firmware-liquidio-20220509-150400.4.5.1
      kernel-firmware-marvell-20220509-150400.4.5.1
      kernel-firmware-media-20220509-150400.4.5.1
      kernel-firmware-mediatek-20220509-150400.4.5.1
      kernel-firmware-mellanox-20220509-150400.4.5.1
      kernel-firmware-mwifiex-20220509-150400.4.5.1
      kernel-firmware-network-20220509-150400.4.5.1
      kernel-firmware-nfp-20220509-150400.4.5.1
      kernel-firmware-nvidia-20220509-150400.4.5.1
      kernel-firmware-platform-20220509-150400.4.5.1
      kernel-firmware-prestera-20220509-150400.4.5.1
      kernel-firmware-qcom-20220509-150400.4.5.1
      kernel-firmware-qlogic-20220509-150400.4.5.1
      kernel-firmware-radeon-20220509-150400.4.5.1
      kernel-firmware-realtek-20220509-150400.4.5.1
      kernel-firmware-serial-20220509-150400.4.5.1
      kernel-firmware-sound-20220509-150400.4.5.1
      kernel-firmware-ti-20220509-150400.4.5.1
      kernel-firmware-ueagle-20220509-150400.4.5.1
      kernel-firmware-usb-network-20220509-150400.4.5.1
      ucode-amd-20220509-150400.4.5.1


References:

   https://www.suse.com/security/cve/CVE-2021-26312.html
   https://www.suse.com/security/cve/CVE-2021-26339.html
   https://www.suse.com/security/cve/CVE-2021-26342.html
   https://www.suse.com/security/cve/CVE-2021-26347.html
   https://www.suse.com/security/cve/CVE-2021-26348.html
   https://www.suse.com/security/cve/CVE-2021-26349.html
   https://www.suse.com/security/cve/CVE-2021-26350.html
   https://www.suse.com/security/cve/CVE-2021-26364.html
   https://www.suse.com/security/cve/CVE-2021-26372.html
   https://www.suse.com/security/cve/CVE-2021-26373.html
   https://www.suse.com/security/cve/CVE-2021-26375.html
   https://www.suse.com/security/cve/CVE-2021-26376.html
   https://www.suse.com/security/cve/CVE-2021-26378.html
   https://www.suse.com/security/cve/CVE-2021-26388.html
   https://www.suse.com/security/cve/CVE-2021-33139.html
   https://www.suse.com/security/cve/CVE-2021-33155.html
   https://www.suse.com/security/cve/CVE-2021-46744.html
   https://bugzilla.suse.com/1195786
   https://bugzilla.suse.com/1199459
   https://bugzilla.suse.com/1199470

SUSE: 2022:1923-1 important: kernel-firmware

June 2, 2022
An update that fixes 17 vulnerabilities is now available

Summary

This update for kernel-firmware fixes the following issues: Update to version 20220411 (git commit f219d616f42b, bsc#1199459): - CVE-2021-26373, CVE-2021-26347, CVE-2021-26376, CVE-2021-26350, CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339, CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349, CVE-2021-26364, CVE-2021-26312: Update AMD cpu microcode Update to version 20220309 (git commit cd01f857da28, bsc#1199470): - CVE-2021-46744: Ciphertext Side Channels on AMD SEV Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786): - CVE-2021-33139, CVE-2021-33155: Improper conditions check in the firmware for some Intel Wireless Bluetooth and Killer Bluetooth products may allow an authenticated user to potentially cause denial of service via adjacent access.

References

#1195786 #1199459 #1199470

Cross- CVE-2021-26312 CVE-2021-26339 CVE-2021-26342

CVE-2021-26347 CVE-2021-26348 CVE-2021-26349

CVE-2021-26350 CVE-2021-26364 CVE-2021-26372

CVE-2021-26373 CVE-2021-26375 CVE-2021-26376

CVE-2021-26378 CVE-2021-26388 CVE-2021-33139

CVE-2021-33155 CVE-2021-46744

CVSS scores:

CVE-2021-26312 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-26339 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26339 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26342 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2021-26342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

CVE-2021-26347 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26348 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVE-2021-26349 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVE-2021-26350 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26364 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26372 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26373 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26375 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26376 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26378 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-26388 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46744 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CVE-2021-46744 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

SUSE Linux Enterprise Desktop 15-SP4

SUSE Linux Enterprise High Performance Computing 15-SP4

SUSE Linux Enterprise Module for Basesystem 15-SP4

SUSE Linux Enterprise Server 15-SP4

SUSE Linux Enterprise Server for SAP Applications 15-SP4

openSUSE Leap 15.4

https://www.suse.com/security/cve/CVE-2021-26312.html

https://www.suse.com/security/cve/CVE-2021-26339.html

https://www.suse.com/security/cve/CVE-2021-26342.html

https://www.suse.com/security/cve/CVE-2021-26347.html

https://www.suse.com/security/cve/CVE-2021-26348.html

https://www.suse.com/security/cve/CVE-2021-26349.html

https://www.suse.com/security/cve/CVE-2021-26350.html

https://www.suse.com/security/cve/CVE-2021-26364.html

https://www.suse.com/security/cve/CVE-2021-26372.html

https://www.suse.com/security/cve/CVE-2021-26373.html

https://www.suse.com/security/cve/CVE-2021-26375.html

https://www.suse.com/security/cve/CVE-2021-26376.html

https://www.suse.com/security/cve/CVE-2021-26378.html

https://www.suse.com/security/cve/CVE-2021-26388.html

https://www.suse.com/security/cve/CVE-2021-33139.html

https://www.suse.com/security/cve/CVE-2021-33155.html

https://www.suse.com/security/cve/CVE-2021-46744.html

https://bugzilla.suse.com/1195786

https://bugzilla.suse.com/1199459

https://bugzilla.suse.com/1199470

Severity
Announcement ID: SUSE-SU-2022:1923-1
Rating: important

Related News