SUSE-SU-2022:1923-1: important: Security update for kernel-firmware

SUSE Security Update: Security update for kernel-firmware______________________________________________________________________________Announcement ID: SUSE-SU-2022:1923-1Rating: importantReferences: #1195786 #1199459 #1199470 Cross-References: CVE-2021-26312 CVE-2021-26339 CVE-2021-26342 CVE-2021-26347 CVE-2021-26348 CVE-2021-26349 CVE-2021-26350 CVE-2021-26364 CVE-2021-26372 CVE-2021-26373 CVE-2021-26375 CVE-2021-26376 CVE-2021-26378 CVE-2021-26388 CVE-2021-33139 CVE-2021-33155 CVE-2021-46744CVSS scores: CVE-2021-26312 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2021-26339 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26339 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26342 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVE-2021-26342 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVE-2021-26347 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26348 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVE-2021-26349 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVE-2021-26350 (NVD) : 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26364 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26372 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26373 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26375 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26376 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26378 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-26388 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-46744 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N CVE-2021-46744 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NAffected Products: SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP Applications 15-SP4 openSUSE Leap 15.4______________________________________________________________________________ An update that fixes 17 vulnerabilities is now available.Description: This update for kernel-firmware fixes the following issues: Update to version 20220411 (git commit f219d616f42b, bsc#1199459): - CVE-2021-26373, CVE-2021-26347, CVE-2021-26376, CVE-2021-26350, CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339, CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349, CVE-2021-26364, CVE-2021-26312: Update AMD cpu microcode Update to version 20220309 (git commit cd01f857da28, bsc#1199470): - CVE-2021-46744: Ciphertext Side Channels on AMD SEV Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786): - CVE-2021-33139, CVE-2021-33155: Improper conditions check in the firmware for some Intel Wireless Bluetooth and Killer Bluetooth products may allow an authenticated user to potentially cause denial of service via adjacent access.Special Instructions and Notes: Please reboot the system after installing this update.Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”. Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1923=1 - SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1923=1Package List: - openSUSE Leap 15.4 (noarch): kernel-firmware-20220509-150400.4.5.1 kernel-firmware-all-20220509-150400.4.5.1 kernel-firmware-amdgpu-20220509-150400.4.5.1 kernel-firmware-ath10k-20220509-150400.4.5.1 kernel-firmware-ath11k-20220509-150400.4.5.1 kernel-firmware-atheros-20220509-150400.4.5.1 kernel-firmware-bluetooth-20220509-150400.4.5.1 kernel-firmware-bnx2-20220509-150400.4.5.1 kernel-firmware-brcm-20220509-150400.4.5.1 kernel-firmware-chelsio-20220509-150400.4.5.1 kernel-firmware-dpaa2-20220509-150400.4.5.1 kernel-firmware-i915-20220509-150400.4.5.1 kernel-firmware-intel-20220509-150400.4.5.1 kernel-firmware-iwlwifi-20220509-150400.4.5.1 kernel-firmware-liquidio-20220509-150400.4.5.1 kernel-firmware-marvell-20220509-150400.4.5.1 kernel-firmware-media-20220509-150400.4.5.1 kernel-firmware-mediatek-20220509-150400.4.5.1 kernel-firmware-mellanox-20220509-150400.4.5.1 kernel-firmware-mwifiex-20220509-150400.4.5.1 kernel-firmware-network-20220509-150400.4.5.1 kernel-firmware-nfp-20220509-150400.4.5.1 kernel-firmware-nvidia-20220509-150400.4.5.1 kernel-firmware-platform-20220509-150400.4.5.1 kernel-firmware-prestera-20220509-150400.4.5.1 kernel-firmware-qcom-20220509-150400.4.5.1 kernel-firmware-qlogic-20220509-150400.4.5.1 kernel-firmware-radeon-20220509-150400.4.5.1 kernel-firmware-realtek-20220509-150400.4.5.1 kernel-firmware-serial-20220509-150400.4.5.1 kernel-firmware-sound-20220509-150400.4.5.1 kernel-firmware-ti-20220509-150400.4.5.1 kernel-firmware-ueagle-20220509-150400.4.5.1 kernel-firmware-usb-network-20220509-150400.4.5.1 ucode-amd-20220509-150400.4.5.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): kernel-firmware-all-20220509-150400.4.5.1 kernel-firmware-amdgpu-20220509-150400.4.5.1 kernel-firmware-ath10k-20220509-150400.4.5.1 kernel-firmware-ath11k-20220509-150400.4.5.1 kernel-firmware-atheros-20220509-150400.4.5.1 kernel-firmware-bluetooth-20220509-150400.4.5.1 kernel-firmware-bnx2-20220509-150400.4.5.1 kernel-firmware-brcm-20220509-150400.4.5.1 kernel-firmware-chelsio-20220509-150400.4.5.1 kernel-firmware-dpaa2-20220509-150400.4.5.1 kernel-firmware-i915-20220509-150400.4.5.1 kernel-firmware-intel-20220509-150400.4.5.1 kernel-firmware-iwlwifi-20220509-150400.4.5.1 kernel-firmware-liquidio-20220509-150400.4.5.1 kernel-firmware-marvell-20220509-150400.4.5.1 kernel-firmware-media-20220509-150400.4.5.1 kernel-firmware-mediatek-20220509-150400.4.5.1 kernel-firmware-mellanox-20220509-150400.4.5.1 kernel-firmware-mwifiex-20220509-150400.4.5.1 kernel-firmware-network-20220509-150400.4.5.1 kernel-firmware-nfp-20220509-150400.4.5.1 kernel-firmware-nvidia-20220509-150400.4.5.1 kernel-firmware-platform-20220509-150400.4.5.1 kernel-firmware-prestera-20220509-150400.4.5.1 kernel-firmware-qcom-20220509-150400.4.5.1 kernel-firmware-qlogic-20220509-150400.4.5.1 kernel-firmware-radeon-20220509-150400.4.5.1 kernel-firmware-realtek-20220509-150400.4.5.1 kernel-firmware-serial-20220509-150400.4.5.1 kernel-firmware-sound-20220509-150400.4.5.1 kernel-firmware-ti-20220509-150400.4.5.1 kernel-firmware-ueagle-20220509-150400.4.5.1 kernel-firmware-usb-network-20220509-150400.4.5.1 ucode-amd-20220509-150400.4.5.1References: https://www.suse.com/security/cve/CVE-2021-26312.html https://www.suse.com/security/cve/CVE-2021-26339.html https://www.suse.com/security/cve/CVE-2021-26342.html https://www.suse.com/security/cve/CVE-2021-26347.html https://www.suse.com/security/cve/CVE-2021-26348.html https://www.suse.com/security/cve/CVE-2021-26349.html https://www.suse.com/security/cve/CVE-2021-26350.html https://www.suse.com/security/cve/CVE-2021-26364.html https://www.suse.com/security/cve/CVE-2021-26372.html https://www.suse.com/security/cve/CVE-2021-26373.html https://www.suse.com/security/cve/CVE-2021-26375.html https://www.suse.com/security/cve/CVE-2021-26376.html https://www.suse.com/security/cve/CVE-2021-26378.html https://www.suse.com/security/cve/CVE-2021-26388.html https://www.suse.com/security/cve/CVE-2021-33139.html https://www.suse.com/security/cve/CVE-2021-33155.html https://www.suse.com/security/cve/CVE-2021-46744.html https://bugzilla.suse.com/1195786 https://bugzilla.suse.com/1199459 https://bugzilla.suse.com/1199470

More…