SUSE-SU-2017:2861-1: moderate: Security update for CaaS Platform 1.0 images

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Oct 26 19:08:10 MDT 2017


   SUSE Security Update: Security update for CaaS Platform 1.0 images
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2861-1
Rating:             moderate
References:         #1005063 #1008325 #1009269 #1012523 #1025176 
                    #1028485 #1032680 #1036659 #1042781 #1045628 
                    #1045735 #1050767 #1050943 #1054028 #1054088 
                    #1054671 #1055920 #1056995 #1060653 #1061876 
                    #1063824 #903543 #978055 #998893 #999878 
                    
Cross-References:   CVE-2017-1000254 CVE-2017-1000257 CVE-2017-11462
                   
Affected Products:
                    SUSE Container as a Service Platform ALL
______________________________________________________________________________

   An update that solves three vulnerabilities and has 22
   fixes is now available.

Description:


   The Docker images provided with SUSE CaaS Platform 1.0 have been updated
   to include the following updates:

   audit:

   - Make auditd start by forking the systemd service to fix some
     initialization failures. (bsc#1042781)

   curl:

   - CVE-2017-1000254: FTP PWD response parser out of bounds read.
     (bsc#1061876)
   - CVE-2017-1000257: IMAP FETCH response out of bounds read. (bsc#1063824)
   - Fixed error "error:1408F10B:SSL routines" when connecting to ftps via
     proxy. (bsc#1060653)

   krb5:

   - CVE-2017-11462: Prevent automatic security context deletion to prevent
     double-free. (bsc#1056995)
   - Set "rdns" and "dns_canonicalize_hostname" to false in krb5.conf in
     order to improve client security in handling service principal names.
     (bsc#1054028)
   - Prevent kadmind.service startup failure caused by absence of LDAP
     service. (bsc#903543)
   - Remove main package's dependency on systemd (bsc#1032680)

   libzypp:

   - Adapt to work with GnuPG 2.1.23. (bsc#1054088)
   - Support signing with subkeys. (bsc#1008325)
   - Enhance sort order for media.1/products. (bsc#1054671)
   - Fix gpg-pubkey release (creation time) computation. (bsc#1036659)

   lvm2:

   - Create /dev/disk/by-part{label,uuid} and gpt-auto-root links.
     (bsc#1028485)
   - Try to refresh clvmd's device cache on the first failure. (bsc#978055)
   - Fix stale device cache in clvmd. (bsc#978055)
   - Warn if PV size in metadata is larger than disk device size. (bsc#999878)
   - Fix lvm2 activation issue when used on top of multipath. (bsc#998893)

   sg3_utils:

   - Add lunsearch filter to findresized() so that only LUNs specified using
     --luns are rescanned or resized. (bsc#1025176)
   - In case the VPD sysfs attributes are missing or cannot be accessed,
     fallback to use sg_inq --page when using multipath devices in AutoYast2
     installations. (bsc#1012523)
   - Generate /dev/disk/by-path links based on WWPN for Fibre Channel NPIV
     setups. (bsc#1005063)
   - Fix dumping data in hexadecimal format in sg_vpd when using the --hex
     option. (bsc#1050943)
   - Fix ID_SERIAL values for KVM disks by exporting all NAA values and
     removing some validity checking. (bsc#1050767)
   - Make sure initrd is rebuilt on sg3_utils updates. (bsc#1009269)

   zypper:

   - Also show a gpg key's subkeys. (bsc#1008325)
   - Improve signature check callback messages. (bsc#1045735)
   - Add options to tune the GPG check settings. (bsc#1045735)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Container as a Service Platform ALL:

      zypper in -t patch SUSE-CAASP-ALL-2017-1782=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Container as a Service Platform ALL (x86_64):

      sles12-mariadb-docker-image-1.1.0-2.5.19
      sles12-pause-docker-image-1.1.0-2.5.21
      sles12-pv-recycler-node-docker-image-1.1.0-2.5.19
      sles12-salt-api-docker-image-1.1.0-2.5.19
      sles12-salt-master-docker-image-1.1.0-4.5.18
      sles12-salt-minion-docker-image-1.1.0-2.5.18
      sles12-velum-docker-image-1.1.0-4.5.18


References:

   https://www.suse.com/security/cve/CVE-2017-1000254.html
   https://www.suse.com/security/cve/CVE-2017-1000257.html
   https://www.suse.com/security/cve/CVE-2017-11462.html
   https://bugzilla.suse.com/1005063
   https://bugzilla.suse.com/1008325
   https://bugzilla.suse.com/1009269
   https://bugzilla.suse.com/1012523
   https://bugzilla.suse.com/1025176
   https://bugzilla.suse.com/1028485
   https://bugzilla.suse.com/1032680
   https://bugzilla.suse.com/1036659
   https://bugzilla.suse.com/1042781
   https://bugzilla.suse.com/1045628
   https://bugzilla.suse.com/1045735
   https://bugzilla.suse.com/1050767
   https://bugzilla.suse.com/1050943
   https://bugzilla.suse.com/1054028
   https://bugzilla.suse.com/1054088
   https://bugzilla.suse.com/1054671
   https://bugzilla.suse.com/1055920
   https://bugzilla.suse.com/1056995
   https://bugzilla.suse.com/1060653
   https://bugzilla.suse.com/1061876
   https://bugzilla.suse.com/1063824
   https://bugzilla.suse.com/903543
   https://bugzilla.suse.com/978055
   https://bugzilla.suse.com/998893
   https://bugzilla.suse.com/999878



More information about the sle-security-updates mailing list