<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for wpa_supplicant</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2755-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-10-18T07:58:56Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-10-18T07:58:56Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-10-18T07:58:56Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for wpa_supplicant</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for wpa_supplicant fixes the security issues:

- Several vulnerabilities in standard conforming implementations of the WPA2
  protocol have been discovered and published under the code name KRACK. This
  update remedies those issues in a backwards compatible manner, i.e. the
  updated wpa_supplicant can interface properly with both vulnerable and
  patched implementations of WPA2, but an attacker won't be able to exploit the
  KRACK weaknesses in those connections anymore even if the other party is
  still vulnerable. [bsc#1056061, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2755-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="wpa_supplicant-2.2-13.1">
      <FullProductName ProductID="wpa_supplicant-2.2-13.1">wpa_supplicant-2.2-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wpa_supplicant-gui-2.2-13.1">
      <FullProductName ProductID="wpa_supplicant-gui-2.2-13.1">wpa_supplicant-gui-2.2-13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="wpa_supplicant-2.2-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:wpa_supplicant-2.2-13.1">wpa_supplicant-2.2-13.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="wpa_supplicant-gui-2.2-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1">wpa_supplicant-gui-2.2-13.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="wpa_supplicant-2.2-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:wpa_supplicant-2.2-13.1">wpa_supplicant-2.2-13.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="wpa_supplicant-gui-2.2-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1">wpa_supplicant-gui-2.2-13.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13078.html</URL>
        <Description>CVE-2017-13078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063667</URL>
        <Description>SUSE Bug 1063667</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13079.html</URL>
        <Description>CVE-2017-13079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13080</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13080.html</URL>
        <Description>CVE-2017-13080</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063667</URL>
        <Description>SUSE Bug 1063667</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063671</URL>
        <Description>SUSE Bug 1063671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066295</URL>
        <Description>SUSE Bug 1066295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105108</URL>
        <Description>SUSE Bug 1105108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178872</URL>
        <Description>SUSE Bug 1178872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13081.html</URL>
        <Description>CVE-2017-13081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066295</URL>
        <Description>SUSE Bug 1066295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105108</URL>
        <Description>SUSE Bug 1105108</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13087</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13087.html</URL>
        <Description>CVE-2017-13087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.</Note>
    </Notes>
    <CVE>CVE-2017-13088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.2:wpa_supplicant-gui-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-2.2-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:wpa_supplicant-gui-2.2-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-13088.html</URL>
        <Description>CVE-2017-13088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056061</URL>
        <Description>SUSE Bug 1056061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1063479</URL>
        <Description>SUSE Bug 1063479</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
