SUSE-SU-2019:3191-1: moderate: Security update for cloud-init

sle-security-updates at sle-security-updates at
Thu Dec 5 13:11:55 MST 2019

   SUSE Security Update: Security update for cloud-init

Announcement ID:    SUSE-SU-2019:3191-1
Rating:             moderate
References:         #1099358 #1129124 #1136440 #1142988 #1144363 
                    #1151488 #1154092 
Cross-References:   CVE-2019-0816
Affected Products:
                    SUSE Linux Enterprise Module for Public Cloud 12
                    SUSE CaaS Platform 3.0

   An update that solves one vulnerability and has 6 fixes is
   now available.


   This update for cloud-init fixes the following issues:

   Security issue fixed:

   - CVE-2019-0816: Fixed the unnecessary extra ssh keys that were added to
     authorized_keys (bsc#1129124).

   Non-security issues fixed:

   - Add cloud-init-renderer-detect.patch (bsc#1154092, bsc#1142988)
     + Short curcuit the conditional for identifying the sysconfig renderer.
       If we find ifup/ifdown accept the renderer as available.

   - Add cloud-init-break-resolv-symlink.patch (bsc#1151488)
     + If /etc/resolv.conf is a symlink break it. This will avoid netconfig
       from clobbering the changes cloud-init applied.

   - Update to cloud-init 19.2 (bsc#1099358)
     + Remove, included upstream
       - cloud-init-detect-nova.diff
       - cloud-init-add-static-routes.diff
     + net: add rfc3442 (classless static routes) to EphemeralDHCP (LP:
     + templates/ntp.conf.debian.tmpl: fix missing newline for pools (LP:
     + Support netplan renderer in Arch Linux [Conrad Hoffmann]
     + Fix typo in publicly viewable documentation. [David Medberry]
     + Add a cdrom size checker for OVF ds to ds-identify [Pengpeng Sun] (LP:
     + VMWare: Trigger the post customization script via cc_scripts module.
       [Xiaofeng Wang] (LP: #1833192)
     + Cloud-init analyze module: Added ability to analyze boot events. [Sam
     + Update debian eni network configuration location, retain Ubuntu
       setting [Janos Lenart]
     + net: skip bond interfaces in get_interfaces [Stanislav Makar] (LP:
     + Fix a couple of issues raised by a coverity scan
     + Add missing dsname for Hetzner Cloud datasource [Markus Schade]
     + doc: indicate that netplan is default in Ubuntu now
     + azure: add region and AZ properties from imds compute location metadata
     + sysconfig: support more bonding options [Penghui Liao]
     + cloud-init-generator: use libexec path to ds-identify on redhat
       systems (LP: #1833264)
     + tools/build-on-freebsd: update to python3 [Gonéri Le Bouder]
     + Allow identification of OpenStack by Asset Tag [Mark T. Voelker] (LP:
     + Fix spelling error making 'an Ubuntu' consistent. [Brian Murray]
     + run-container: centos: comment out the repo mirrorlist [Paride
     + netplan: update netplan key mappings for gratuitous-arp (LP: #1827238)
     + freebsd: fix the name of cloudcfg VARIANT [Gonéri Le Bouder]
     + freebsd: ability to grow root file system [Gonéri Le Bouder]
     + freebsd: NoCloud data source support [Gonéri Le Bouder] (LP: #1645824)
     + Azure: Return static fallback address as if failed to find endpoint
       [Jason Zions (MSFT)]

   - Follow up to update cloud-init-trigger-udev.patch (bsc#1144363)
   - Update to version 19.1 (bsc#1136440, bsc#1129124)

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Public Cloud 12:

      zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2019-3191=1

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

Package List:

   - SUSE Linux Enterprise Module for Public Cloud 12 (aarch64 ppc64le s390x x86_64):


   - SUSE CaaS Platform 3.0 (x86_64):



More information about the sle-security-updates mailing list