SUSE: 2022:1065-1 important: kernel-firmware | LinuxSecurity.com

   SUSE Security Update: Security update for kernel-firmware
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1065-1
Rating:             important
References:         #1186938 #1188662 #1192953 #1195786 #1196333 
                    
Cross-References:   CVE-2021-0066 CVE-2021-0071 CVE-2021-0072
                    CVE-2021-0076 CVE-2021-0161 CVE-2021-0164
                    CVE-2021-0165 CVE-2021-0166 CVE-2021-0168
                    CVE-2021-0170 CVE-2021-0172 CVE-2021-0173
                    CVE-2021-0174 CVE-2021-0175 CVE-2021-0176
                    CVE-2021-0183 CVE-2021-33139 CVE-2021-33155
                   
CVSS scores:
                    CVE-2021-0066 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0066 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0071 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0072 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-0072 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-0076 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0076 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0161 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0161 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0164 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0164 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0165 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0165 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0166 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0166 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0168 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0168 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-0170 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-0170 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-0172 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0172 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0173 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0173 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0174 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0174 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0175 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0175 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0176 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0176 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0183 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-0183 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP3
                    SUSE Linux Enterprise High Performance Computing 15-SP3
                    SUSE Linux Enterprise Micro 5.1
                    SUSE Linux Enterprise Module for Basesystem 15-SP3
                    SUSE Linux Enterprise Server 15-SP3
                    SUSE Linux Enterprise Server for SAP Applications 15-SP3
                    SUSE Manager Proxy 4.2
                    SUSE Manager Server 4.2
______________________________________________________________________________

   An update that fixes 18 vulnerabilities is now available.

Description:

   This update for kernel-firmware fixes the following issues:

   Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333):

   CVE-2021-0161: Improper input validation in firmware for Intel
   PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to
   potentially enable escalation of privilege via local access.
   CVE-2021-0164: Improper access control in firmware for Intel
   PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
   to potentially enable escalation of privilege via local access.
   CVE-2021-0165: Improper input validation in firmware for Intel
   PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
   to potentially enable denial of service via adjacent access.
   CVE-2021-0066: Improper input validation in firmware for Intel
   PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user
   to potentially enable escalation of privilege via local access.
   CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor
   in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may
   allow a privileged user to potentially enable escalation of privilege via
   local access. CVE-2021-0168: Improper input validation in firmware for
   some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a
   privileged user to potentially enable escalation of privilege via local
   access. CVE-2021-0170: Exposure of Sensitive Information to an
   Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and
   some Killer Wi-Fi may allow an authenticated user to potentially enable
   information disclosure via local access. CVE-2021-0172: Improper input
   validation in firmware for some Intel PROSet/Wireless Wi-Fi and some
   Killer Wi-Fi may allow an unauthenticated user to potentially enable
   denial of service via adjacent access. CVE-2021-0173: Improper Validation
   of Consistency within input in firmware for some Intel PROSet/Wireless
   Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to
   potentially enable denial of service via adjacent access. CVE-2021-0174:
   Improper Use of Validation Framework in firmware for some Intel
   PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated
   user to potentially enable denial of service via adjacent access.
   CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset
   in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer
   Wi-Fi may allow an unauthenticated user to potentially enable denial of
   service via adjacent access. CVE-2021-0076: Improper Validation of
   Specified Index, Position, or Offset in Input in firmware for some Intel
   PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to
   potentially enable denial of service via local access. CVE-2021-0176:
   Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi
   and some Killer Wi-Fi may allow a privileged user to potentially enable
   denial of service via local access. CVE-2021-0183: Improper Validation of
   Specified Index, Position, or Offset in Input in software for some Intel
   PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated
   user to potentially enable denial of service via adjacent access.
   CVE-2021-0072: Improper input validation in firmware for some Intel
   PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to
   potentially enable information disclosure via local access. CVE-2021-0071:
   Improper input validation in firmware for some Intel PROSet/Wireless WiFi
   in UEFI may allow an unauthenticated user to potentially enable escalation
   of privilege via adjacent access.


   Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786):

   - CVE-2021-33139: Improper conditions check in firmware for some Intel
     Wireless Bluetooth and Killer Bluetooth products before may allow an
     authenticated user to potentially enable denial of service via adjacent
     access.
   - CVE-2021-33155: Improper input validation in firmware for some Intel
     Wireless Bluetooth and Killer Bluetooth products before may allow an
     authenticated user to potentially enable denial of service via adjacent
     access.


   Bug fixes:

   - Updated the AMD SEV firmware (bsc#1186938)
   - Reduced the LZMA2 dictionary size (bsc#1188662)


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Basesystem 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1065=1

   - SUSE Linux Enterprise Micro 5.1:

      zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1065=1



Package List:

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):

      kernel-firmware-20210208-150300.4.7.1
      kernel-firmware-brcm-20210208-150300.4.7.1
      ucode-amd-20210208-150300.4.7.1

   - SUSE Linux Enterprise Micro 5.1 (noarch):

      kernel-firmware-all-20210208-150300.4.7.1
      kernel-firmware-amdgpu-20210208-150300.4.7.1
      kernel-firmware-ath10k-20210208-150300.4.7.1
      kernel-firmware-ath11k-20210208-150300.4.7.1
      kernel-firmware-atheros-20210208-150300.4.7.1
      kernel-firmware-bluetooth-20210208-150300.4.7.1
      kernel-firmware-bnx2-20210208-150300.4.7.1
      kernel-firmware-brcm-20210208-150300.4.7.1
      kernel-firmware-chelsio-20210208-150300.4.7.1
      kernel-firmware-dpaa2-20210208-150300.4.7.1
      kernel-firmware-i915-20210208-150300.4.7.1
      kernel-firmware-intel-20210208-150300.4.7.1
      kernel-firmware-iwlwifi-20210208-150300.4.7.1
      kernel-firmware-liquidio-20210208-150300.4.7.1
      kernel-firmware-marvell-20210208-150300.4.7.1
      kernel-firmware-media-20210208-150300.4.7.1
      kernel-firmware-mediatek-20210208-150300.4.7.1
      kernel-firmware-mellanox-20210208-150300.4.7.1
      kernel-firmware-mwifiex-20210208-150300.4.7.1
      kernel-firmware-network-20210208-150300.4.7.1
      kernel-firmware-nfp-20210208-150300.4.7.1
      kernel-firmware-nvidia-20210208-150300.4.7.1
      kernel-firmware-platform-20210208-150300.4.7.1
      kernel-firmware-prestera-20210208-150300.4.7.1
      kernel-firmware-qlogic-20210208-150300.4.7.1
      kernel-firmware-radeon-20210208-150300.4.7.1
      kernel-firmware-realtek-20210208-150300.4.7.1
      kernel-firmware-serial-20210208-150300.4.7.1
      kernel-firmware-sound-20210208-150300.4.7.1
      kernel-firmware-ti-20210208-150300.4.7.1
      kernel-firmware-ueagle-20210208-150300.4.7.1
      kernel-firmware-usb-network-20210208-150300.4.7.1
      ucode-amd-20210208-150300.4.7.1


References:

   https://www.suse.com/security/cve/CVE-2021-0066.html
   https://www.suse.com/security/cve/CVE-2021-0071.html
   https://www.suse.com/security/cve/CVE-2021-0072.html
   https://www.suse.com/security/cve/CVE-2021-0076.html
   https://www.suse.com/security/cve/CVE-2021-0161.html
   https://www.suse.com/security/cve/CVE-2021-0164.html
   https://www.suse.com/security/cve/CVE-2021-0165.html
   https://www.suse.com/security/cve/CVE-2021-0166.html
   https://www.suse.com/security/cve/CVE-2021-0168.html
   https://www.suse.com/security/cve/CVE-2021-0170.html
   https://www.suse.com/security/cve/CVE-2021-0172.html
   https://www.suse.com/security/cve/CVE-2021-0173.html
   https://www.suse.com/security/cve/CVE-2021-0174.html
   https://www.suse.com/security/cve/CVE-2021-0175.html
   https://www.suse.com/security/cve/CVE-2021-0176.html
   https://www.suse.com/security/cve/CVE-2021-0183.html
   https://www.suse.com/security/cve/CVE-2021-33139.html
   https://www.suse.com/security/cve/CVE-2021-33155.html
   https://bugzilla.suse.com/1186938
   https://bugzilla.suse.com/1188662
   https://bugzilla.suse.com/1192953
   https://bugzilla.suse.com/1195786
   https://bugzilla.suse.com/1196333

SUSE: 2022:1065-1 important: kernel-firmware

March 31, 2022
An update that fixes 18 vulnerabilities is now available

Summary

This update for kernel-firmware fixes the following issues: Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333): CVE-2021-0161: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0164: Improper access control in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0165: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0066: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0168: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0170: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an authenticated user to potentially enable information disclosure via local access. CVE-2021-0172: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0173: Improper Validation of Consistency within input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0174: Improper Use of Validation Framework in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0076: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0176: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0183: Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0072: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable information disclosure via local access. CVE-2021-0071: Improper input validation in firmware for some Intel PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786): - CVE-2021-33139: Improper conditions check in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access. - CVE-2021-33155: Improper input validation in firmware for some Intel Wireless Bluetooth and Killer Bluetooth products before may allow an authenticated user to potentially enable denial of service via adjacent access. Bug fixes: - Updated the AMD SEV firmware (bsc#1186938) - Reduced the LZMA2 dictionary size (bsc#1188662)

References

#1186938 #1188662 #1192953 #1195786 #1196333

Cross- CVE-2021-0066 CVE-2021-0071 CVE-2021-0072

CVE-2021-0076 CVE-2021-0161 CVE-2021-0164

CVE-2021-0165 CVE-2021-0166 CVE-2021-0168

CVE-2021-0170 CVE-2021-0172 CVE-2021-0173

CVE-2021-0174 CVE-2021-0175 CVE-2021-0176

CVE-2021-0183 CVE-2021-33139 CVE-2021-33155

CVSS scores:

CVE-2021-0066 (NVD) : 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0066 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0071 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0072 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-0072 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-0076 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0076 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0161 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0161 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0164 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0164 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0165 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0165 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0166 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0166 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0168 (NVD) : 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0168 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-0170 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-0170 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2021-0172 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0172 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0173 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0173 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0174 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0174 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0175 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0175 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0176 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0176 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0183 (NVD) : 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-0183 (SUSE): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33139 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33139 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33155 (NVD) : 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-33155 (SUSE): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Desktop 15-SP3

SUSE Linux Enterprise High Performance Computing 15-SP3

SUSE Linux Enterprise Micro 5.1

SUSE Linux Enterprise Module for Basesystem 15-SP3

SUSE Linux Enterprise Server 15-SP3

SUSE Linux Enterprise Server for SAP Applications 15-SP3

SUSE Manager Proxy 4.2

SUSE Manager Server 4.2

https://www.suse.com/security/cve/CVE-2021-0066.html

https://www.suse.com/security/cve/CVE-2021-0071.html

https://www.suse.com/security/cve/CVE-2021-0072.html

https://www.suse.com/security/cve/CVE-2021-0076.html

https://www.suse.com/security/cve/CVE-2021-0161.html

https://www.suse.com/security/cve/CVE-2021-0164.html

https://www.suse.com/security/cve/CVE-2021-0165.html

https://www.suse.com/security/cve/CVE-2021-0166.html

https://www.suse.com/security/cve/CVE-2021-0168.html

https://www.suse.com/security/cve/CVE-2021-0170.html

https://www.suse.com/security/cve/CVE-2021-0172.html

https://www.suse.com/security/cve/CVE-2021-0173.html

https://www.suse.com/security/cve/CVE-2021-0174.html

https://www.suse.com/security/cve/CVE-2021-0175.html

https://www.suse.com/security/cve/CVE-2021-0176.html

https://www.suse.com/security/cve/CVE-2021-0183.html

https://www.suse.com/security/cve/CVE-2021-33139.html

https://www.suse.com/security/cve/CVE-2021-33155.html

https://bugzilla.suse.com/1186938

https://bugzilla.suse.com/1188662

https://bugzilla.suse.com/1192953

https://bugzilla.suse.com/1195786

https://bugzilla.suse.com/1196333

Severity
Announcement ID: SUSE-SU-2022:1065-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.