Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in kernel-firmware
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in kernel-firmware
ID: SUSE-SU-2022:1065-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Basesystem 15-SP3, SUSE Linux Enterprise Micro 5.1, SUSE Manager Server 4.2, SUSE Linux Enterprise High Performance Computing 15-SP3, SUSE Manager Proxy 4.2, SUSE Linux Enterprise Server 15-SP3, SUSE Linux Enterprise Server for SAP Applications 15-SP3, SUSE Linux Enterprise Desktop 15-SP3
Datum: Fr, 1. April 2022, 08:07
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33155
Applikationen: kernel-firmware

Originalnachricht


SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________

Announcement ID: SUSE-SU-2022:1065-1
Rating: important
References: #1186938 #1188662 #1192953 #1195786 #1196333

Cross-References: CVE-2021-0066 CVE-2021-0071 CVE-2021-0072
CVE-2021-0076 CVE-2021-0161 CVE-2021-0164
CVE-2021-0165 CVE-2021-0166 CVE-2021-0168
CVE-2021-0170 CVE-2021-0172 CVE-2021-0173
CVE-2021-0174 CVE-2021-0175 CVE-2021-0176
CVE-2021-0183 CVE-2021-33139 CVE-2021-33155

CVSS scores:
CVE-2021-0066 (NVD) : 8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0066 (SUSE): 8.4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0071 (NVD) : 8.8
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0072 (NVD) : 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-0072 (SUSE): 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-0076 (NVD) : 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0076 (SUSE): 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0161 (NVD) : 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0161 (SUSE): 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0164 (NVD) : 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0164 (SUSE): 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0165 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0165 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0166 (NVD) : 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0166 (SUSE): 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0168 (NVD) : 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0168 (SUSE): 6.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2021-0170 (NVD) : 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-0170 (SUSE): 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-0172 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0172 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0173 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0173 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0174 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0174 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0175 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0175 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0176 (NVD) : 4.4
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0176 (SUSE): 4.4
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0183 (NVD) : 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-0183 (SUSE): 6.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33139 (NVD) : 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33139 (SUSE): 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (NVD) : 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-33155 (SUSE): 5.7
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
______________________________________________________________________________

An update that fixes 18 vulnerabilities is now available.

Description:

This update for kernel-firmware fixes the following issues:

Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333):

CVE-2021-0161: Improper input validation in firmware for Intel
PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to
potentially enable escalation of privilege via local access.
CVE-2021-0164: Improper access control in firmware for Intel
PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
to potentially enable escalation of privilege via local access.
CVE-2021-0165: Improper input validation in firmware for Intel
PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
to potentially enable denial of service via adjacent access.
CVE-2021-0066: Improper input validation in firmware for Intel
PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
to potentially enable escalation of privilege via local access.
CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor
in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may
allow a privileged user to potentially enable escalation of privilege via
local access. CVE-2021-0168: Improper input validation in firmware for
some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a
privileged user to potentially enable escalation of privilege via local
access. CVE-2021-0170: Exposure of Sensitive Information to an
Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and
some Killer Wi-Fi may allow an authenticated user to potentially enable
information disclosure via local access. CVE-2021-0172: Improper input
validation in firmware for some Intel PROSet/Wireless Wi-Fi and some
Killer Wi-Fi may allow an unauthenticated user to potentially enable
denial of service via adjacent access. CVE-2021-0173: Improper Validation
of Consistency within input in firmware for some Intel PROSet/Wireless
Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to
potentially enable denial of service via adjacent access. CVE-2021-0174:
Improper Use of Validation Framework in firmware for some Intel
PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated
user to potentially enable denial of service via adjacent access.
CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset
in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer
Wi-Fi may allow an unauthenticated user to potentially enable denial of
service via adjacent access. CVE-2021-0076: Improper Validation of
Specified Index, Position, or Offset in Input in firmware for some Intel
PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to
potentially enable denial of service via local access. CVE-2021-0176:
Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi
and some Killer Wi-Fi may allow a privileged user to potentially enable
denial of service via local access. CVE-2021-0183: Improper Validation of
Specified Index, Position, or Offset in Input in software for some Intel
PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated
user to potentially enable denial of service via adjacent access.
CVE-2021-0072: Improper input validation in firmware for some Intel
PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to
potentially enable information disclosure via local access. CVE-2021-0071:
Improper input validation in firmware for some Intel PROSet/Wireless WiFi
in UEFI may allow an unauthenticated user to potentially enable escalation
of privilege via adjacent access.


Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786):

- CVE-2021-33139: Improper conditions check in firmware for some Intel
Wireless Bluetooth and Killer Bluetooth products before may allow an
authenticated user to potentially enable denial of service via adjacent
access.
- CVE-2021-33155: Improper input validation in firmware for some Intel
Wireless Bluetooth and Killer Bluetooth products before may allow an
authenticated user to potentially enable denial of service via adjacent
access.


Bug fixes:

- Updated the AMD SEV firmware (bsc#1186938)
- Reduced the LZMA2 dictionary size (bsc#1188662)


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Basesystem 15-SP3:

zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1065=1

- SUSE Linux Enterprise Micro 5.1:

zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1065=1



Package List:

- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):

kernel-firmware-20210208-150300.4.7.1
kernel-firmware-brcm-20210208-150300.4.7.1
ucode-amd-20210208-150300.4.7.1

- SUSE Linux Enterprise Micro 5.1 (noarch):

kernel-firmware-all-20210208-150300.4.7.1
kernel-firmware-amdgpu-20210208-150300.4.7.1
kernel-firmware-ath10k-20210208-150300.4.7.1
kernel-firmware-ath11k-20210208-150300.4.7.1
kernel-firmware-atheros-20210208-150300.4.7.1
kernel-firmware-bluetooth-20210208-150300.4.7.1
kernel-firmware-bnx2-20210208-150300.4.7.1
kernel-firmware-brcm-20210208-150300.4.7.1
kernel-firmware-chelsio-20210208-150300.4.7.1
kernel-firmware-dpaa2-20210208-150300.4.7.1
kernel-firmware-i915-20210208-150300.4.7.1
kernel-firmware-intel-20210208-150300.4.7.1
kernel-firmware-iwlwifi-20210208-150300.4.7.1
kernel-firmware-liquidio-20210208-150300.4.7.1
kernel-firmware-marvell-20210208-150300.4.7.1
kernel-firmware-media-20210208-150300.4.7.1
kernel-firmware-mediatek-20210208-150300.4.7.1
kernel-firmware-mellanox-20210208-150300.4.7.1
kernel-firmware-mwifiex-20210208-150300.4.7.1
kernel-firmware-network-20210208-150300.4.7.1
kernel-firmware-nfp-20210208-150300.4.7.1
kernel-firmware-nvidia-20210208-150300.4.7.1
kernel-firmware-platform-20210208-150300.4.7.1
kernel-firmware-prestera-20210208-150300.4.7.1
kernel-firmware-qlogic-20210208-150300.4.7.1
kernel-firmware-radeon-20210208-150300.4.7.1
kernel-firmware-realtek-20210208-150300.4.7.1
kernel-firmware-serial-20210208-150300.4.7.1
kernel-firmware-sound-20210208-150300.4.7.1
kernel-firmware-ti-20210208-150300.4.7.1
kernel-firmware-ueagle-20210208-150300.4.7.1
kernel-firmware-usb-network-20210208-150300.4.7.1
ucode-amd-20210208-150300.4.7.1


References:

https://www.suse.com/security/cve/CVE-2021-0066.html
https://www.suse.com/security/cve/CVE-2021-0071.html
https://www.suse.com/security/cve/CVE-2021-0072.html
https://www.suse.com/security/cve/CVE-2021-0076.html
https://www.suse.com/security/cve/CVE-2021-0161.html
https://www.suse.com/security/cve/CVE-2021-0164.html
https://www.suse.com/security/cve/CVE-2021-0165.html
https://www.suse.com/security/cve/CVE-2021-0166.html
https://www.suse.com/security/cve/CVE-2021-0168.html
https://www.suse.com/security/cve/CVE-2021-0170.html
https://www.suse.com/security/cve/CVE-2021-0172.html
https://www.suse.com/security/cve/CVE-2021-0173.html
https://www.suse.com/security/cve/CVE-2021-0174.html
https://www.suse.com/security/cve/CVE-2021-0175.html
https://www.suse.com/security/cve/CVE-2021-0176.html
https://www.suse.com/security/cve/CVE-2021-0183.html
https://www.suse.com/security/cve/CVE-2021-33139.html
https://www.suse.com/security/cve/CVE-2021-33155.html
https://bugzilla.suse.com/1186938
https://bugzilla.suse.com/1188662
https://bugzilla.suse.com/1192953
https://bugzilla.suse.com/1195786
https://bugzilla.suse.com/1196333
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung