Security update for SLES 12 Docker image
Announcement ID: | SUSE-SU-2017:2699-1 |
Rating: | important |
References: | #1056193 #975726 |
Affected Products: |
An update that fixes 140 vulnerabilities is now available.
Description:
The SUSE Linux Enterprise Server 12 container image has been updated to
include security and stability fixes.
The following issues related to building of the container images have been
fixed:
- Included krb5 package to avoid the inclusion of krb5-mini which gets
selected as a dependency by the Build Service solver. (bsc#1056193)
- Do not install recommended packages when building container images.
(bsc#975726)
A number of security issues that have been already fixed by updates
released for SUSE Linux Enterprise Server 12 are now included in the base
image. A package/CVE cross-reference is available below.
pam:
- CVE-2015-3238
libtasn1:
- CVE-2015-3622
- CVE-2016-4008
libidn:
- CVE-2015-2059
- CVE-2015-8948
- CVE-2016-6261
- CVE-2016-6262
- CVE-2016-6263
zlib:
- CVE-2016-9840
- CVE-2016-9841
- CVE-2016-9842
- CVE-2016-9843
curl:
- CVE-2016-5419
- CVE-2016-5420
- CVE-2016-5421
- CVE-2016-7141
- CVE-2016-7167
- CVE-2016-8615
- CVE-2016-8616
- CVE-2016-8617
- CVE-2016-8618
- CVE-2016-8619
- CVE-2016-8620
- CVE-2016-8621
- CVE-2016-8622
- CVE-2016-8623
- CVE-2016-8624
- CVE-2016-9586
- CVE-2017-1000100
- CVE-2017-1000101
- CVE-2017-7407
openssl:
- CVE-2016-2105
- CVE-2016-2106
- CVE-2016-2107
- CVE-2016-2108
- CVE-2016-2109
- CVE-2016-2177
- CVE-2016-2178
- CVE-2016-2179
- CVE-2016-2180
- CVE-2016-2181
- CVE-2016-2182
- CVE-2016-2183
- CVE-2016-6302
- CVE-2016-6303
- CVE-2016-6304
- CVE-2016-6306
libxml2:
- CVE-2014-0191
- CVE-2015-8806
- CVE-2016-1762
- CVE-2016-1833
- CVE-2016-1834
- CVE-2016-1835
- CVE-2016-1837
- CVE-2016-1838
- CVE-2016-1839
- CVE-2016-1840
- CVE-2016-2073
- CVE-2016-3627
- CVE-2016-3705
- CVE-2016-4447
- CVE-2016-4448
- CVE-2016-4449
- CVE-2016-4483
- CVE-2016-4658
- CVE-2016-9318
- CVE-2016-9597
- CVE-2017-9047
- CVE-2017-9048
- CVE-2017-9049
- CVE-2017-9050
util-linux:
- CVE-2015-5218
- CVE-2016-5011
- CVE-2017-2616
cracklib:
- CVE-2016-6318
systemd:
- CVE-2014-9770
- CVE-2015-8842
- CVE-2016-7796
pcre:
- CVE-2014-8964
- CVE-2015-2325
- CVE-2015-2327
- CVE-2015-2328
- CVE-2015-3210
- CVE-2015-3217
- CVE-2015-5073
- CVE-2015-8380
- CVE-2015-8381
- CVE-2015-8382
- CVE-2015-8383
- CVE-2015-8384
- CVE-2015-8385
- CVE-2015-8386
- CVE-2015-8387
- CVE-2015-8388
- CVE-2015-8389
- CVE-2015-8390
- CVE-2015-8391
- CVE-2015-8392
- CVE-2015-8393
- CVE-2015-8394
- CVE-2015-8395
- CVE-2016-1283
- CVE-2016-3191
appamor:
- CVE-2017-6507
bash:
- CVE-2014-6277
- CVE-2014-6278
- CVE-2016-0634
- CVE-2016-7543
cpio:
- CVE-2016-2037
glibc:
- CVE-2016-1234
- CVE-2016-3075
- CVE-2016-3706
- CVE-2016-4429
- CVE-2017-1000366
perl:
- CVE-2015-8853
- CVE-2016-1238
- CVE-2016-2381
- CVE-2016-6185
libssh2_org:
- CVE-2016-0787
expat:
- CVE-2012-6702
- CVE-2015-1283
- CVE-2016-0718
- CVE-2016-5300
- CVE-2016-9063
- CVE-2017-9233
ncurses:
- CVE-2017-10684
- CVE-2017-10685
- CVE-2017-11112
- CVE-2017-11113
libksba:
- CVE-2016-4574
- CVE-2016-4579
libgcrypt:
- CVE-2015-7511
- CVE-2016-6313
- CVE-2017-7526
dbus-1:
- CVE-2014-7824
- CVE-2015-0245
Finally, the following packages received non-security fixes:
- augeas
- bzip2
- ca-certificates-mozilla
- coreutils
- cryptsetup
- cyrus-sasl
- dirmngr
- e2fsprogs
- findutils
- gpg2
- insserv-compat
- kmod
- libcap
- libsolv
- libzypp
- openldap2
- p11-kit
- permissions
- procps
- rpm
- sed
- shadow
- zypper
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Containers 12:
zypper in -t patch SUSE-SLE-Module-Containers-12-2017-1672=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Module for Containers 12 (ppc64le s390x x86_64):
- sles12-docker-image-1.1.4-20171002
References:
- https://www.suse.com/security/cve/CVE-2012-6702.html
- https://www.suse.com/security/cve/CVE-2014-0191.html
- https://www.suse.com/security/cve/CVE-2014-6271.html
- https://www.suse.com/security/cve/CVE-2014-6277.html
- https://www.suse.com/security/cve/CVE-2014-6278.html
- https://www.suse.com/security/cve/CVE-2014-7169.html
- https://www.suse.com/security/cve/CVE-2014-7187.html
- https://www.suse.com/security/cve/CVE-2014-7824.html
- https://www.suse.com/security/cve/CVE-2014-8964.html
- https://www.suse.com/security/cve/CVE-2014-9770.html
- https://www.suse.com/security/cve/CVE-2015-0245.html
- https://www.suse.com/security/cve/CVE-2015-1283.html
- https://www.suse.com/security/cve/CVE-2015-2059.html
- https://www.suse.com/security/cve/CVE-2015-2325.html
- https://www.suse.com/security/cve/CVE-2015-2327.html
- https://www.suse.com/security/cve/CVE-2015-2328.html
- https://www.suse.com/security/cve/CVE-2015-3210.html
- https://www.suse.com/security/cve/CVE-2015-3217.html
- https://www.suse.com/security/cve/CVE-2015-3238.html
- https://www.suse.com/security/cve/CVE-2015-3622.html
- https://www.suse.com/security/cve/CVE-2015-5073.html
- https://www.suse.com/security/cve/CVE-2015-5218.html
- https://www.suse.com/security/cve/CVE-2015-5276.html
- https://www.suse.com/security/cve/CVE-2015-7511.html
- https://www.suse.com/security/cve/CVE-2015-8380.html
- https://www.suse.com/security/cve/CVE-2015-8381.html
- https://www.suse.com/security/cve/CVE-2015-8382.html
- https://www.suse.com/security/cve/CVE-2015-8383.html
- https://www.suse.com/security/cve/CVE-2015-8384.html
- https://www.suse.com/security/cve/CVE-2015-8385.html
- https://www.suse.com/security/cve/CVE-2015-8386.html
- https://www.suse.com/security/cve/CVE-2015-8387.html
- https://www.suse.com/security/cve/CVE-2015-8388.html
- https://www.suse.com/security/cve/CVE-2015-8389.html
- https://www.suse.com/security/cve/CVE-2015-8390.html
- https://www.suse.com/security/cve/CVE-2015-8391.html
- https://www.suse.com/security/cve/CVE-2015-8392.html
- https://www.suse.com/security/cve/CVE-2015-8393.html
- https://www.suse.com/security/cve/CVE-2015-8394.html
- https://www.suse.com/security/cve/CVE-2015-8395.html
- https://www.suse.com/security/cve/CVE-2015-8806.html
- https://www.suse.com/security/cve/CVE-2015-8842.html
- https://www.suse.com/security/cve/CVE-2015-8853.html
- https://www.suse.com/security/cve/CVE-2015-8948.html
- https://www.suse.com/security/cve/CVE-2016-0634.html
- https://www.suse.com/security/cve/CVE-2016-0718.html
- https://www.suse.com/security/cve/CVE-2016-0787.html
- https://www.suse.com/security/cve/CVE-2016-1234.html
- https://www.suse.com/security/cve/CVE-2016-1238.html
- https://www.suse.com/security/cve/CVE-2016-1283.html
- https://www.suse.com/security/cve/CVE-2016-1762.html
- https://www.suse.com/security/cve/CVE-2016-1833.html
- https://www.suse.com/security/cve/CVE-2016-1834.html
- https://www.suse.com/security/cve/CVE-2016-1835.html
- https://www.suse.com/security/cve/CVE-2016-1837.html
- https://www.suse.com/security/cve/CVE-2016-1838.html
- https://www.suse.com/security/cve/CVE-2016-1839.html
- https://www.suse.com/security/cve/CVE-2016-1840.html
- https://www.suse.com/security/cve/CVE-2016-2037.html
- https://www.suse.com/security/cve/CVE-2016-2073.html
- https://www.suse.com/security/cve/CVE-2016-2105.html
- https://www.suse.com/security/cve/CVE-2016-2106.html
- https://www.suse.com/security/cve/CVE-2016-2107.html
- https://www.suse.com/security/cve/CVE-2016-2108.html
- https://www.suse.com/security/cve/CVE-2016-2109.html
- https://www.suse.com/security/cve/CVE-2016-2177.html
- https://www.suse.com/security/cve/CVE-2016-2178.html
- https://www.suse.com/security/cve/CVE-2016-2179.html
- https://www.suse.com/security/cve/CVE-2016-2180.html
- https://www.suse.com/security/cve/CVE-2016-2181.html
- https://www.suse.com/security/cve/CVE-2016-2182.html
- https://www.suse.com/security/cve/CVE-2016-2183.html
- https://www.suse.com/security/cve/CVE-2016-2381.html
- https://www.suse.com/security/cve/CVE-2016-3075.html
- https://www.suse.com/security/cve/CVE-2016-3191.html
- https://www.suse.com/security/cve/CVE-2016-3627.html
- https://www.suse.com/security/cve/CVE-2016-3705.html
- https://www.suse.com/security/cve/CVE-2016-3706.html
- https://www.suse.com/security/cve/CVE-2016-4008.html
- https://www.suse.com/security/cve/CVE-2016-4429.html
- https://www.suse.com/security/cve/CVE-2016-4447.html
- https://www.suse.com/security/cve/CVE-2016-4448.html
- https://www.suse.com/security/cve/CVE-2016-4449.html
- https://www.suse.com/security/cve/CVE-2016-4483.html
- https://www.suse.com/security/cve/CVE-2016-4574.html
- https://www.suse.com/security/cve/CVE-2016-4579.html
- https://www.suse.com/security/cve/CVE-2016-4658.html
- https://www.suse.com/security/cve/CVE-2016-5011.html
- https://www.suse.com/security/cve/CVE-2016-5300.html
- https://www.suse.com/security/cve/CVE-2016-5419.html
- https://www.suse.com/security/cve/CVE-2016-5420.html
- https://www.suse.com/security/cve/CVE-2016-5421.html
- https://www.suse.com/security/cve/CVE-2016-6185.html
- https://www.suse.com/security/cve/CVE-2016-6261.html
- https://www.suse.com/security/cve/CVE-2016-6262.html
- https://www.suse.com/security/cve/CVE-2016-6263.html
- https://www.suse.com/security/cve/CVE-2016-6302.html
- https://www.suse.com/security/cve/CVE-2016-6303.html
- https://www.suse.com/security/cve/CVE-2016-6304.html
- https://www.suse.com/security/cve/CVE-2016-6306.html
- https://www.suse.com/security/cve/CVE-2016-6313.html
- https://www.suse.com/security/cve/CVE-2016-6318.html
- https://www.suse.com/security/cve/CVE-2016-7141.html
- https://www.suse.com/security/cve/CVE-2016-7167.html
- https://www.suse.com/security/cve/CVE-2016-7543.html
- https://www.suse.com/security/cve/CVE-2016-7796.html
- https://www.suse.com/security/cve/CVE-2016-8615.html
- https://www.suse.com/security/cve/CVE-2016-8616.html
- https://www.suse.com/security/cve/CVE-2016-8617.html
- https://www.suse.com/security/cve/CVE-2016-8618.html
- https://www.suse.com/security/cve/CVE-2016-8619.html
- https://www.suse.com/security/cve/CVE-2016-8620.html
- https://www.suse.com/security/cve/CVE-2016-8621.html
- https://www.suse.com/security/cve/CVE-2016-8622.html
- https://www.suse.com/security/cve/CVE-2016-8623.html
- https://www.suse.com/security/cve/CVE-2016-8624.html
- https://www.suse.com/security/cve/CVE-2016-9063.html
- https://www.suse.com/security/cve/CVE-2016-9318.html
- https://www.suse.com/security/cve/CVE-2016-9586.html
- https://www.suse.com/security/cve/CVE-2016-9597.html
- https://www.suse.com/security/cve/CVE-2016-9840.html
- https://www.suse.com/security/cve/CVE-2016-9841.html
- https://www.suse.com/security/cve/CVE-2016-9842.html
- https://www.suse.com/security/cve/CVE-2016-9843.html
- https://www.suse.com/security/cve/CVE-2017-1000100.html
- https://www.suse.com/security/cve/CVE-2017-1000101.html
- https://www.suse.com/security/cve/CVE-2017-1000366.html
- https://www.suse.com/security/cve/CVE-2017-10684.html
- https://www.suse.com/security/cve/CVE-2017-10685.html
- https://www.suse.com/security/cve/CVE-2017-11112.html
- https://www.suse.com/security/cve/CVE-2017-11113.html
- https://www.suse.com/security/cve/CVE-2017-2616.html
- https://www.suse.com/security/cve/CVE-2017-6507.html
- https://www.suse.com/security/cve/CVE-2017-7407.html
- https://www.suse.com/security/cve/CVE-2017-7526.html
- https://www.suse.com/security/cve/CVE-2017-9047.html
- https://www.suse.com/security/cve/CVE-2017-9048.html
- https://www.suse.com/security/cve/CVE-2017-9049.html
- https://www.suse.com/security/cve/CVE-2017-9050.html
- https://www.suse.com/security/cve/CVE-2017-9233.html
- https://bugzilla.suse.com/1056193
- https://bugzilla.suse.com/975726