SUSE-SU-2022:1923-1: important: Security update for kernel-firmware
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Jun 2 16:20:15 UTC 2022
SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1923-1
Rating: important
References: #1195786 #1199459 #1199470
Cross-References: CVE-2021-26312 CVE-2021-26339 CVE-2021-26342
CVE-2021-26347 CVE-2021-26348 CVE-2021-26349
CVE-2021-26350 CVE-2021-26364 CVE-2021-26372
CVE-2021-26373 CVE-2021-26375 CVE-2021-26376
CVE-2021-26378 CVE-2021-26388 CVE-2021-33139
CVE-2021-33155 CVE-2021-46744
CVSS scores:
CVE-2021-26312 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-26339 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26339 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26342 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-26342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVE-2021-26347 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26348 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-26349 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-26350 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26364 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26372 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26373 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26375 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26376 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26378 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-26388 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-46744 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVE-2021-46744 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
This update for kernel-firmware fixes the following issues:
Update to version 20220411 (git commit f219d616f42b, bsc#1199459):
- CVE-2021-26373, CVE-2021-26347, CVE-2021-26376, CVE-2021-26350,
CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339,
CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349,
CVE-2021-26364, CVE-2021-26312: Update AMD cpu microcode
Update to version 20220309 (git commit cd01f857da28, bsc#1199470):
- CVE-2021-46744: Ciphertext Side Channels on AMD SEV
Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786):
- CVE-2021-33139, CVE-2021-33155: Improper conditions check in the
firmware for some Intel Wireless Bluetooth and Killer Bluetooth products
may allow an authenticated user to potentially cause denial of service
via adjacent access.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1923=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1923=1
Package List:
- openSUSE Leap 15.4 (noarch):
kernel-firmware-20220509-150400.4.5.1
kernel-firmware-all-20220509-150400.4.5.1
kernel-firmware-amdgpu-20220509-150400.4.5.1
kernel-firmware-ath10k-20220509-150400.4.5.1
kernel-firmware-ath11k-20220509-150400.4.5.1
kernel-firmware-atheros-20220509-150400.4.5.1
kernel-firmware-bluetooth-20220509-150400.4.5.1
kernel-firmware-bnx2-20220509-150400.4.5.1
kernel-firmware-brcm-20220509-150400.4.5.1
kernel-firmware-chelsio-20220509-150400.4.5.1
kernel-firmware-dpaa2-20220509-150400.4.5.1
kernel-firmware-i915-20220509-150400.4.5.1
kernel-firmware-intel-20220509-150400.4.5.1
kernel-firmware-iwlwifi-20220509-150400.4.5.1
kernel-firmware-liquidio-20220509-150400.4.5.1
kernel-firmware-marvell-20220509-150400.4.5.1
kernel-firmware-media-20220509-150400.4.5.1
kernel-firmware-mediatek-20220509-150400.4.5.1
kernel-firmware-mellanox-20220509-150400.4.5.1
kernel-firmware-mwifiex-20220509-150400.4.5.1
kernel-firmware-network-20220509-150400.4.5.1
kernel-firmware-nfp-20220509-150400.4.5.1
kernel-firmware-nvidia-20220509-150400.4.5.1
kernel-firmware-platform-20220509-150400.4.5.1
kernel-firmware-prestera-20220509-150400.4.5.1
kernel-firmware-qcom-20220509-150400.4.5.1
kernel-firmware-qlogic-20220509-150400.4.5.1
kernel-firmware-radeon-20220509-150400.4.5.1
kernel-firmware-realtek-20220509-150400.4.5.1
kernel-firmware-serial-20220509-150400.4.5.1
kernel-firmware-sound-20220509-150400.4.5.1
kernel-firmware-ti-20220509-150400.4.5.1
kernel-firmware-ueagle-20220509-150400.4.5.1
kernel-firmware-usb-network-20220509-150400.4.5.1
ucode-amd-20220509-150400.4.5.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
kernel-firmware-all-20220509-150400.4.5.1
kernel-firmware-amdgpu-20220509-150400.4.5.1
kernel-firmware-ath10k-20220509-150400.4.5.1
kernel-firmware-ath11k-20220509-150400.4.5.1
kernel-firmware-atheros-20220509-150400.4.5.1
kernel-firmware-bluetooth-20220509-150400.4.5.1
kernel-firmware-bnx2-20220509-150400.4.5.1
kernel-firmware-brcm-20220509-150400.4.5.1
kernel-firmware-chelsio-20220509-150400.4.5.1
kernel-firmware-dpaa2-20220509-150400.4.5.1
kernel-firmware-i915-20220509-150400.4.5.1
kernel-firmware-intel-20220509-150400.4.5.1
kernel-firmware-iwlwifi-20220509-150400.4.5.1
kernel-firmware-liquidio-20220509-150400.4.5.1
kernel-firmware-marvell-20220509-150400.4.5.1
kernel-firmware-media-20220509-150400.4.5.1
kernel-firmware-mediatek-20220509-150400.4.5.1
kernel-firmware-mellanox-20220509-150400.4.5.1
kernel-firmware-mwifiex-20220509-150400.4.5.1
kernel-firmware-network-20220509-150400.4.5.1
kernel-firmware-nfp-20220509-150400.4.5.1
kernel-firmware-nvidia-20220509-150400.4.5.1
kernel-firmware-platform-20220509-150400.4.5.1
kernel-firmware-prestera-20220509-150400.4.5.1
kernel-firmware-qcom-20220509-150400.4.5.1
kernel-firmware-qlogic-20220509-150400.4.5.1
kernel-firmware-radeon-20220509-150400.4.5.1
kernel-firmware-realtek-20220509-150400.4.5.1
kernel-firmware-serial-20220509-150400.4.5.1
kernel-firmware-sound-20220509-150400.4.5.1
kernel-firmware-ti-20220509-150400.4.5.1
kernel-firmware-ueagle-20220509-150400.4.5.1
kernel-firmware-usb-network-20220509-150400.4.5.1
ucode-amd-20220509-150400.4.5.1
References:
https://www.suse.com/security/cve/CVE-2021-26312.html
https://www.suse.com/security/cve/CVE-2021-26339.html
https://www.suse.com/security/cve/CVE-2021-26342.html
https://www.suse.com/security/cve/CVE-2021-26347.html
https://www.suse.com/security/cve/CVE-2021-26348.html
https://www.suse.com/security/cve/CVE-2021-26349.html
https://www.suse.com/security/cve/CVE-2021-26350.html
https://www.suse.com/security/cve/CVE-2021-26364.html
https://www.suse.com/security/cve/CVE-2021-26372.html
https://www.suse.com/security/cve/CVE-2021-26373.html
https://www.suse.com/security/cve/CVE-2021-26375.html
https://www.suse.com/security/cve/CVE-2021-26376.html
https://www.suse.com/security/cve/CVE-2021-26378.html
https://www.suse.com/security/cve/CVE-2021-26388.html
https://www.suse.com/security/cve/CVE-2021-33139.html
https://www.suse.com/security/cve/CVE-2021-33155.html
https://www.suse.com/security/cve/CVE-2021-46744.html
https://bugzilla.suse.com/1195786
https://bugzilla.suse.com/1199459
https://bugzilla.suse.com/1199470
More information about the sle-updates
mailing list