Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in wpa_supplicant
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in wpa_supplicant
ID: openSUSE-SU-2017:2755-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.2, openSUSE Leap 42.3
Datum: Mi, 18. Oktober 2017, 16:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
Applikationen: wpa_supplicant

Originalnachricht

   openSUSE Security Update: Security update for wpa_supplicant
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2755-1
Rating: important
References: #1056061
Cross-References: CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13087 CVE-2017-13088

Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the
WPA2 protocol have been discovered and published under the code name
KRACK. This update remedies those issues in a backwards compatible
manner, i.e. the updated wpa_supplicant can interface properly with both
vulnerable and patched implementations of WPA2, but an attacker won't
be
able to exploit the KRACK weaknesses in those connections anymore even
if the other party is still vulnerable. [bsc#1056061, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087,
CVE-2017-13088]

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1163=1

- openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1163=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.3 (i586 x86_64):

wpa_supplicant-2.2-13.1
wpa_supplicant-debuginfo-2.2-13.1
wpa_supplicant-debugsource-2.2-13.1
wpa_supplicant-gui-2.2-13.1
wpa_supplicant-gui-debuginfo-2.2-13.1

- openSUSE Leap 42.2 (i586 x86_64):

wpa_supplicant-2.2-9.3.1
wpa_supplicant-debuginfo-2.2-9.3.1
wpa_supplicant-debugsource-2.2-9.3.1
wpa_supplicant-gui-2.2-9.3.1
wpa_supplicant-gui-debuginfo-2.2-9.3.1


References:

https://www.suse.com/security/cve/CVE-2017-13078.html
https://www.suse.com/security/cve/CVE-2017-13079.html
https://www.suse.com/security/cve/CVE-2017-13080.html
https://www.suse.com/security/cve/CVE-2017-13081.html
https://www.suse.com/security/cve/CVE-2017-13087.html
https://www.suse.com/security/cve/CVE-2017-13088.html
https://bugzilla.suse.com/1056061

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung