Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: wpa_supplicant: WPA2 attacks (VU#228519) aka "KRACK" | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Major | ||
Priority: | P2 - High | CC: | BArendartchuk, bjoernv, jcheung, lurodriguez, matthias.gerstner, meissner, peter.simons, ro, schietzsch, simonf.lees, stephan.lahl |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
URL: | https://smash.suse.de/issue/191142/ | ||
Whiteboard: | CVSSv2:SUSE:CVE-2017-13077:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13078:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13079:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13080:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13081:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13082:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13084:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13086:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13087:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv2:SUSE:CVE-2017-13088:7.8:(AV:A/AC:L/Au:N/C:C/I:C/A:N) CVSSv3:SUSE:CVE-2017-13077:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13078:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13079:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13080:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13081:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13082:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13084:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13086:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13087:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) CVSSv3:SUSE:CVE-2017-13088:8.1:(AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | ||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Comment 6
Johannes Segitz
2017-10-16 09:56:28 UTC
hostap part will be dealt with in bsc#1063479 SUSE-SU-2017:2745-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1056061 CVE References: CVE-2017-13078,CVE-2017-13079,CVE-2017-13080,CVE-2017-13081,CVE-2017-13087,CVE-2017-13088 Sources used: SUSE OpenStack Cloud 6 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server for SAP 12-SP1 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server 12-SP3 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server 12-SP2 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server 12-SP1-LTSS (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Server 12-LTSS (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Desktop 12-SP3 (src): wpa_supplicant-2.2-15.3.1 SUSE Linux Enterprise Desktop 12-SP2 (src): wpa_supplicant-2.2-15.3.1 SUSE-SU-2017:2752-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1056061 CVE References: CVE-2017-13078,CVE-2017-13079,CVE-2017-13080,CVE-2017-13081,CVE-2017-13087,CVE-2017-13088 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): wpa_supplicant-0.7.1-6.18.3.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): wpa_supplicant-0.7.1-6.18.3.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): wpa_supplicant-0.7.1-6.18.3.1 openSUSE-SU-2017:2755-1: An update that fixes 6 vulnerabilities is now available. Category: security (important) Bug References: 1056061 CVE References: CVE-2017-13078,CVE-2017-13079,CVE-2017-13080,CVE-2017-13081,CVE-2017-13087,CVE-2017-13088 Sources used: openSUSE Leap 42.3 (src): wpa_supplicant-2.2-13.1 openSUSE Leap 42.2 (src): wpa_supplicant-2.2-9.3.1 SUSE-SU-2017:2847-1: An update that solves 11 vulnerabilities and has 170 fixes is now available. Category: security (important) Bug References: 1004527,1005776,1005778,1005780,1005781,1012382,1012829,1015342,1015343,1019675,1019680,1019695,1019699,1020412,1020645,1020657,1020989,1021424,1022595,1022604,1022743,1022912,1022967,1024346,1024373,1024405,1025461,1030850,1031717,1031784,1032150,1034048,1034075,1035479,1036060,1036215,1036737,1037579,1037838,1037890,1038583,1040813,1042847,1043598,1044503,1046529,1047238,1047487,1047989,1048155,1048228,1048325,1048327,1048356,1048501,1048893,1048912,1048934,1049226,1049272,1049291,1049336,1049361,1049580,1050471,1050742,1051790,1051987,1052093,1052094,1052095,1052360,1052384,1052580,1052593,1052888,1053043,1053309,1053472,1053627,1053629,1053633,1053681,1053685,1053802,1053915,1053919,1054082,1054084,1054654,1055013,1055096,1055272,1055290,1055359,1055493,1055567,1055709,1055755,1055896,1055935,1055963,1056061,1056185,1056230,1056261,1056427,1056587,1056588,1056596,1056686,1056827,1056849,1056982,1057015,1057031,1057035,1057038,1057047,1057067,1057383,1057498,1057849,1058038,1058116,1058135,1058410,1058507,1058512,1058550,1059051,1059465,1059500,1059863,1060197,1060229,1060249,1060400,1060985,1061017,1061046,1061064,1061067,1061172,1061451,1061721,1061775,1061831,1061872,1062279,1062520,1062962,1063102,1063349,1063460,1063475,1063479,1063501,1063509,1063520,1063570,1063667,1063671,1063695,1064064,1064206,1064388,1064436,963575,964944,966170,966172,966186,966191,966316,966318,969476,969477,969756,971975,981309 CVE References: CVE-2017-1000252,CVE-2017-11472,CVE-2017-12134,CVE-2017-12153,CVE-2017-12154,CVE-2017-13080,CVE-2017-14051,CVE-2017-14106,CVE-2017-14489,CVE-2017-15265,CVE-2017-15649 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP3 (src): kernel-default-4.4.92-6.18.1 SUSE Linux Enterprise Software Development Kit 12-SP3 (src): kernel-docs-4.4.92-6.18.3, kernel-obs-build-4.4.92-6.18.1 SUSE Linux Enterprise Server 12-SP3 (src): kernel-default-4.4.92-6.18.1, kernel-source-4.4.92-6.18.1, kernel-syms-4.4.92-6.18.1 SUSE Linux Enterprise Live Patching 12-SP3 (src): kgraft-patch-SLE12-SP3_Update_4-1-4.3 SUSE Linux Enterprise High Availability 12-SP3 (src): kernel-default-4.4.92-6.18.1 SUSE Linux Enterprise Desktop 12-SP3 (src): kernel-default-4.4.92-6.18.1, kernel-source-4.4.92-6.18.1, kernel-syms-4.4.92-6.18.1 This is an autogenerated message for OBS integration: This bug (1056061) was mentioned in https://build.opensuse.org/request/show/772819 15.1+Backports:SLE-15+Backports:SLE-15-SP1 / hostapd openSUSE-SU-2020:0222-1: An update that fixes 7 vulnerabilities is now available. Category: security (moderate) Bug References: 1056061 CVE References: CVE-2017-13082,CVE-2019-9494,CVE-2019-9495,CVE-2019-9496,CVE-2019-9497,CVE-2019-9498,CVE-2019-9499 Sources used: openSUSE Leap 15.1 (src): hostapd-2.9-lp151.4.3.1 openSUSE Backports SLE-15-SP1 (src): hostapd-2.9-bp151.5.3.1 openSUSE Backports SLE-15 (src): hostapd-2.9-bp150.15.1 released |