Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in kernel-firmware
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in kernel-firmware
ID: SUSE-SU-2022:0910-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP 12-SP4, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 9, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 12-SP4-LTSS
Datum: Di, 22. März 2022, 08:21
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33139
Applikationen: kernel-firmware

Originalnachricht


SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________

Announcement ID: SUSE-SU-2022:0910-1
Rating: moderate
References: #1195786
Cross-References: CVE-2021-33139 CVE-2021-33155
CVSS scores:
CVE-2021-33139 (NVD) : 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33139 (SUSE): 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (NVD) : 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (SUSE): 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 9
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for kernel-firmware fixes the following issues:

Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786):

- CVE-2021-33139, CVE-2021-33155: Improper conditions check in the
firmware for some Intel Wireless Bluetooth and Killer Bluetooth products
may allow an authenticated user to potentially cause denial of service
via adjacent access.


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud Crowbar 9:

zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-910=1

- SUSE OpenStack Cloud 9:

zypper in -t patch SUSE-OpenStack-Cloud-9-2022-910=1

- SUSE Linux Enterprise Server for SAP 12-SP4:

zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-910=1

- SUSE Linux Enterprise Server 12-SP5:

zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-910=1

- SUSE Linux Enterprise Server 12-SP4-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-910=1



Package List:

- SUSE OpenStack Cloud Crowbar 9 (noarch):

kernel-firmware-20190618-5.22.1
ucode-amd-20190618-5.22.1

- SUSE OpenStack Cloud 9 (noarch):

kernel-firmware-20190618-5.22.1
ucode-amd-20190618-5.22.1

- SUSE Linux Enterprise Server for SAP 12-SP4 (noarch):

kernel-firmware-20190618-5.22.1
ucode-amd-20190618-5.22.1

- SUSE Linux Enterprise Server 12-SP5 (noarch):

kernel-firmware-20190618-5.22.1
ucode-amd-20190618-5.22.1

- SUSE Linux Enterprise Server 12-SP4-LTSS (noarch):

kernel-firmware-20190618-5.22.1
ucode-amd-20190618-5.22.1


References:

https://www.suse.com/security/cve/CVE-2021-33139.html
https://www.suse.com/security/cve/CVE-2021-33155.html
https://bugzilla.suse.com/1195786
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung