File _patchinfo of Package patchinfo.23209

<patchinfo incident="23209">
  <issue tracker="cve" id="2021-33155"/>
  <issue tracker="cve" id="2021-33139"/>
  <issue tracker="cve" id="2021-26347"/>
  <issue tracker="cve" id="2021-46744"/>
  <issue tracker="cve" id="2021-26388"/>
  <issue tracker="cve" id="2021-26378"/>
  <issue tracker="cve" id="2021-26372"/>
  <issue tracker="cve" id="2021-26342"/>
  <issue tracker="cve" id="2021-26375"/>
  <issue tracker="cve" id="2021-26349"/>
  <issue tracker="cve" id="2021-26348"/>
  <issue tracker="cve" id="2021-26339"/>
  <issue tracker="cve" id="2021-26376"/>
  <issue tracker="cve" id="2021-26350"/>
  <issue tracker="cve" id="2021-26364"/>
  <issue tracker="cve" id="2021-26312"/>
  <issue tracker="cve" id="2021-26373"/>
  <issue tracker="bnc" id="1195786">VUL-0: CVE-2021-33139,CVE-2021-33155: kernel-firmware: multiple vulnerabilities in Bluetooth firmware (INTEL-SA-00604)</issue>
  <issue tracker="bnc" id="1199459">VUL-0: kernel-firmware: security issues in AMD EPYC</issue>
  <issue tracker="bnc" id="1199470">VUL-0: CVE-2021-46744: kernel-firmware: Ciphertext Side Channels on AMD SEV</issue>
  <packager>tiwai</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for kernel-firmware</summary>
  <description>This update for kernel-firmware fixes the following issues:

Update to version 20220411 (git commit f219d616f42b, bsc#1199459):
    
- CVE-2021-26373, CVE-2021-26347, CVE-2021-26376, CVE-2021-26350,
  CVE-2021-26375, CVE-2021-26378, CVE-2021-26372, CVE-2021-26339,
  CVE-2021-26348, CVE-2021-26342, CVE-2021-26388, CVE-2021-26349,
  CVE-2021-26364, CVE-2021-26312: Update AMD cpu microcode

    
Update to version 20220309 (git commit cd01f857da28, bsc#1199470):

- CVE-2021-46744: Ciphertext Side Channels on AMD SEV

    
Update Intel Bluetooth firmware (INTEL-SA-00604, bsc#1195786):

- CVE-2021-33139, CVE-2021-33155: Improper conditions check in the firmware for some Intel Wireless Bluetooth and Killer Bluetooth products may allow an authenticated user to potentially cause denial of service via adjacent access.
</description>
<reboot_needed/>
</patchinfo>
openSUSE Build Service is sponsored by