{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-3_12_60-52_63-default":"10-2.1","kgraft-patch-3_12_60-52_63-xen":"10-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"kgraft-patch-SLE12_Update_18","purl":"pkg:rpm/suse/kgraft-patch-SLE12_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"10-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 3.12.60-52_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-15649: net/packet/af_packet.c in the Linux kernel allowed local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346 (bsc#1064392)\n- CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allowed reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients (bsc#1063671, bsc#1066472, bsc#1066471)\n","id":"SUSE-SU-2017:3151-1","modified":"2017-11-30T07:24:15Z","published":"2017-11-30T07:24:15Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20173151-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1063671"},{"type":"REPORT","url":"https://bugzilla.suse.com/1064392"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1066472"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-13080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-15649"}],"related":["CVE-2017-13080","CVE-2017-15649"],"summary":"Security update for the Linux Kernel (Live Patch 18 for SLE 12)","upstream":["CVE-2017-13080","CVE-2017-15649"]}