SUSE-SU-2017:3148-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:3148-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:3148-1
Related
Published
2017-11-30T07:20:41Z
Modified
2017-11-30T07:20:41Z
Summary
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)
Details

This update for the Linux Kernel 3.12.74-606457 fixes several issues.

The following security issues were fixed:

  • CVE-2017-15649: net/packet/afpacket.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packetfanout data structures, because of a race condition (involving fanoutadd and packetdo_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bsc#1064392)
  • CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)
References

Affected packages

SUSE:Linux Enterprise Server for SAP Applications 12 SP1 / kgraft-patch-SLE12-SP1_Update_20

Package

Name
kgraft-patch-SLE12-SP1_Update_20
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-3_12_74-60_64_57-xen": "4-2.1",
            "kgraft-patch-3_12_74-60_64_57-default": "4-2.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP1-LTSS / kgraft-patch-SLE12-SP1_Update_20

Package

Name
kgraft-patch-SLE12-SP1_Update_20
Purl
purl:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-3_12_74-60_64_57-xen": "4-2.1",
            "kgraft-patch-3_12_74-60_64_57-default": "4-2.1"
        }
    ]
}