Security update for kernel-firmware

Announcement ID: SUSE-SU-2022:1065-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2021-0066 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0066 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0071 ( SUSE ): 6.8 CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0071 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-0072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-0076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0161 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0161 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0164 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0164 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0165 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0165 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0166 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0166 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0168 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0168 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-0170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-0170 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2021-0172 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0172 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0173 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0173 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0174 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0174 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0175 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0175 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0176 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0176 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0183 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-0183 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-33139 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-33139 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-33155 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2021-33155 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • Basesystem Module 15-SP3
  • openSUSE Leap 15.3
  • SUSE Linux Enterprise Desktop 15 SP3
  • SUSE Linux Enterprise High Performance Computing 15 SP3
  • SUSE Linux Enterprise Micro 5.1
  • SUSE Linux Enterprise Real Time 15 SP3
  • SUSE Linux Enterprise Server 15 SP3
  • SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
  • SUSE Linux Enterprise Server for SAP Applications 15 SP3
  • SUSE Manager Proxy 4.2
  • SUSE Manager Retail Branch Server 4.2
  • SUSE Manager Server 4.2

An update that solves 18 vulnerabilities can now be installed.

Description:

This update for kernel-firmware fixes the following issues:

Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333):

CVE-2021-0161: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0164: Improper access control in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0165: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0066: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0168: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0170: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an authenticated user to potentially enable information disclosure via local access. CVE-2021-0172: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0173: Improper Validation of Consistency within input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0174: Improper Use of Validation Framework in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0076: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0176: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0183: Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0072: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable information disclosure via local access. CVE-2021-0071: Improper input validation in firmware for some Intel PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786):

  • CVE-2021-33139: Improper conditions check in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access.
  • CVE-2021-33155: Improper input validation in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access.

Bug fixes:

  • Updated the AMD SEV firmware (bsc#1186938)
  • Reduced the LZMA2 dictionary size (bsc#1188662)

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3
    zypper in -t patch SUSE-2022-1065=1
  • Basesystem Module 15-SP3
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1065=1
  • SUSE Linux Enterprise Micro 5.1
    zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1065=1

Package List:

  • openSUSE Leap 15.3 (noarch)
    • kernel-firmware-bnx2-20210208-150300.4.7.1
    • kernel-firmware-radeon-20210208-150300.4.7.1
    • kernel-firmware-ath10k-20210208-150300.4.7.1
    • kernel-firmware-chelsio-20210208-150300.4.7.1
    • kernel-firmware-sound-20210208-150300.4.7.1
    • kernel-firmware-bluetooth-20210208-150300.4.7.1
    • kernel-firmware-qlogic-20210208-150300.4.7.1
    • kernel-firmware-ti-20210208-150300.4.7.1
    • kernel-firmware-nfp-20210208-150300.4.7.1
    • kernel-firmware-network-20210208-150300.4.7.1
    • kernel-firmware-amdgpu-20210208-150300.4.7.1
    • kernel-firmware-nvidia-20210208-150300.4.7.1
    • kernel-firmware-prestera-20210208-150300.4.7.1
    • kernel-firmware-i915-20210208-150300.4.7.1
    • kernel-firmware-atheros-20210208-150300.4.7.1
    • kernel-firmware-ueagle-20210208-150300.4.7.1
    • kernel-firmware-dpaa2-20210208-150300.4.7.1
    • kernel-firmware-intel-20210208-150300.4.7.1
    • kernel-firmware-realtek-20210208-150300.4.7.1
    • kernel-firmware-usb-network-20210208-150300.4.7.1
    • kernel-firmware-mediatek-20210208-150300.4.7.1
    • kernel-firmware-ath11k-20210208-150300.4.7.1
    • kernel-firmware-mellanox-20210208-150300.4.7.1
    • kernel-firmware-marvell-20210208-150300.4.7.1
    • kernel-firmware-serial-20210208-150300.4.7.1
    • kernel-firmware-20210208-150300.4.7.1
    • ucode-amd-20210208-150300.4.7.1
    • kernel-firmware-mwifiex-20210208-150300.4.7.1
    • kernel-firmware-media-20210208-150300.4.7.1
    • kernel-firmware-iwlwifi-20210208-150300.4.7.1
    • kernel-firmware-all-20210208-150300.4.7.1
    • kernel-firmware-liquidio-20210208-150300.4.7.1
    • kernel-firmware-platform-20210208-150300.4.7.1
    • kernel-firmware-brcm-20210208-150300.4.7.1
  • Basesystem Module 15-SP3 (noarch)
    • kernel-firmware-20210208-150300.4.7.1
    • kernel-firmware-brcm-20210208-150300.4.7.1
    • ucode-amd-20210208-150300.4.7.1
  • SUSE Linux Enterprise Micro 5.1 (noarch)
    • kernel-firmware-bnx2-20210208-150300.4.7.1
    • kernel-firmware-radeon-20210208-150300.4.7.1
    • kernel-firmware-ath10k-20210208-150300.4.7.1
    • kernel-firmware-chelsio-20210208-150300.4.7.1
    • kernel-firmware-sound-20210208-150300.4.7.1
    • kernel-firmware-bluetooth-20210208-150300.4.7.1
    • kernel-firmware-qlogic-20210208-150300.4.7.1
    • kernel-firmware-ti-20210208-150300.4.7.1
    • kernel-firmware-nfp-20210208-150300.4.7.1
    • kernel-firmware-network-20210208-150300.4.7.1
    • kernel-firmware-amdgpu-20210208-150300.4.7.1
    • kernel-firmware-nvidia-20210208-150300.4.7.1
    • kernel-firmware-prestera-20210208-150300.4.7.1
    • kernel-firmware-i915-20210208-150300.4.7.1
    • kernel-firmware-atheros-20210208-150300.4.7.1
    • kernel-firmware-ueagle-20210208-150300.4.7.1
    • kernel-firmware-dpaa2-20210208-150300.4.7.1
    • kernel-firmware-intel-20210208-150300.4.7.1
    • kernel-firmware-realtek-20210208-150300.4.7.1
    • kernel-firmware-usb-network-20210208-150300.4.7.1
    • kernel-firmware-mediatek-20210208-150300.4.7.1
    • kernel-firmware-ath11k-20210208-150300.4.7.1
    • kernel-firmware-mellanox-20210208-150300.4.7.1
    • kernel-firmware-marvell-20210208-150300.4.7.1
    • kernel-firmware-serial-20210208-150300.4.7.1
    • ucode-amd-20210208-150300.4.7.1
    • kernel-firmware-mwifiex-20210208-150300.4.7.1
    • kernel-firmware-media-20210208-150300.4.7.1
    • kernel-firmware-iwlwifi-20210208-150300.4.7.1
    • kernel-firmware-all-20210208-150300.4.7.1
    • kernel-firmware-liquidio-20210208-150300.4.7.1
    • kernel-firmware-platform-20210208-150300.4.7.1
    • kernel-firmware-brcm-20210208-150300.4.7.1

References: