SUSE 5181 Published by

The following updates has been released for openSUSE:

openSUSE-SU-2019:0295-1: important: Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc
openSUSE-SU-2019:0296-1: moderate: Security update for apache2
openSUSE-SU-2019:0297-1: moderate: Security update for amavisd-new



openSUSE-SU-2019:0295-1: important: Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc

openSUSE Security Update: Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0295-1
Rating: important
References: #1048046 #1051429 #1114832 #1118897 #1118898
#1118899 #1121967 #1124308
Cross-References: CVE-2018-16873 CVE-2018-16874 CVE-2018-16875
CVE-2019-5736
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves four vulnerabilities and has four
fixes is now available.

Description:

This update for containerd, docker, docker-runc,
golang-github-docker-libnetwork, runc fixes the following issues:

Security issues fixed:

- CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899).
- CVE-2018-16874: Fixed a vulnerabity in go get command which could allow
directory traversal in GOPATH mode (bsc#1118898).
- CVE-2018-16873: Fixed a vulnerability in go get command which could
allow remote code execution when executed with -u in GOPATH mode
(bsc#1118897).
- CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to
avoid write attacks to the host runc binary, which could lead to a
container breakout (bsc#1121967).

Other changes and fixes:

- Update shell completion to use Group: System/Shells.
- Add daemon.json file with rotation logs configuration (bsc#1114832)
- Update to Docker 18.09.1-ce (bsc#1124308) and to to runc 96ec2177ae84.
See upstream changelog in the packaged
/usr/share/doc/packages/docker/CHANGELOG.md.
- Update go requirements to >= go1.10
- Use -buildmode=pie for tests and binary build (bsc#1048046 and
bsc#1051429).
- Remove the usage of 'cp -r' to reduce noise in the build logs.

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-295=1



Package List:

- openSUSE Leap 15.0 (noarch):

containerd-test-1.2.2-lp150.4.10.1
docker-bash-completion-18.09.1_ce-lp150.5.13.1
docker-runc-test-1.0.0rc6+gitr3748_96ec2177ae84-lp150.5.14.1
docker-zsh-completion-18.09.1_ce-lp150.5.13.1
runc-test-1.0.0~rc6-lp150.2.7.1

- openSUSE Leap 15.0 (x86_64):

containerd-1.2.2-lp150.4.10.1
containerd-ctr-1.2.2-lp150.4.10.1
docker-18.09.1_ce-lp150.5.13.1
docker-debuginfo-18.09.1_ce-lp150.5.13.1
docker-debugsource-18.09.1_ce-lp150.5.13.1
docker-libnetwork-0.7.0.1+gitr2711_2cfbf9b1f981-lp150.3.10.1
docker-libnetwork-debuginfo-0.7.0.1+gitr2711_2cfbf9b1f981-lp150.3.10.1
docker-runc-1.0.0rc6+gitr3748_96ec2177ae84-lp150.5.14.1
docker-runc-debuginfo-1.0.0rc6+gitr3748_96ec2177ae84-lp150.5.14.1
docker-test-18.09.1_ce-lp150.5.13.1
docker-test-debuginfo-18.09.1_ce-lp150.5.13.1
golang-github-docker-libnetwork-0.7.0.1+gitr2711_2cfbf9b1f981-lp150.3.10.1
runc-1.0.0~rc6-lp150.2.7.1
runc-debuginfo-1.0.0~rc6-lp150.2.7.1


References:

https://www.suse.com/security/cve/CVE-2018-16873.html
https://www.suse.com/security/cve/CVE-2018-16874.html
https://www.suse.com/security/cve/CVE-2018-16875.html
https://www.suse.com/security/cve/CVE-2019-5736.html
https://bugzilla.suse.com/1048046
https://bugzilla.suse.com/1051429
https://bugzilla.suse.com/1114832
https://bugzilla.suse.com/1118897
https://bugzilla.suse.com/1118898
https://bugzilla.suse.com/1118899
https://bugzilla.suse.com/1121967
https://bugzilla.suse.com/1124308

--


openSUSE-SU-2019:0296-1: moderate: Security update for apache2

openSUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0296-1
Rating: moderate
References: #1121086 #1122838 #1122839
Cross-References: CVE-2018-17189 CVE-2018-17199
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2018-17189: Fixed a denial of service in mod_http2, via slow and
unneeded request bodies (bsc#1122838)
- CVE-2018-17199: Fixed that mod_session_cookie did not respect expiry
time (bsc#1122839)

Non-security issue fixed:

- sysconfig.d is not created anymore if it already exists (bsc#1121086)

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-296=1



Package List:

- openSUSE Leap 15.0 (i586 x86_64):

apache2-2.4.33-lp150.2.9.1
apache2-debuginfo-2.4.33-lp150.2.9.1
apache2-debugsource-2.4.33-lp150.2.9.1
apache2-devel-2.4.33-lp150.2.9.1
apache2-event-2.4.33-lp150.2.9.1
apache2-event-debuginfo-2.4.33-lp150.2.9.1
apache2-example-pages-2.4.33-lp150.2.9.1
apache2-prefork-2.4.33-lp150.2.9.1
apache2-prefork-debuginfo-2.4.33-lp150.2.9.1
apache2-utils-2.4.33-lp150.2.9.1
apache2-utils-debuginfo-2.4.33-lp150.2.9.1
apache2-worker-2.4.33-lp150.2.9.1
apache2-worker-debuginfo-2.4.33-lp150.2.9.1

- openSUSE Leap 15.0 (noarch):

apache2-doc-2.4.33-lp150.2.9.1


References:

https://www.suse.com/security/cve/CVE-2018-17189.html
https://www.suse.com/security/cve/CVE-2018-17199.html
https://bugzilla.suse.com/1121086
https://bugzilla.suse.com/1122838
https://bugzilla.suse.com/1122839

--


openSUSE-SU-2019:0297-1: moderate: Security update for amavisd-new

openSUSE Security Update: Security update for amavisd-new
______________________________________________________________________________

Announcement ID: openSUSE-SU-2019:0297-1
Rating: moderate
References: #1123389 #987887
Cross-References: CVE-2016-1238
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for amavisd-new fixes the following issues:

Security issue fixed:

- CVE-2016-1238: Workedaround a perl vulnerability by removing a trailing
dot element from @INC (bsc#987887).

Other issues addressed:

- update to version 2.11.1 (bsc#1123389).
- amavis-services: bumping up syslog level from LOG_NOTICE to LOG_ERR for
a message "PID went away", and removed redundant newlines from
some log messages
- avoid warning messages "Use of uninitialized value in subroutine entry"
in Encode::MIME::Header when the $check argument is undefined
- @sa_userconf_maps has been extended to allow loading of per-recipient
(or per-policy bank, or global) SpamAssassin configuration set from
LDAP. For consistency with SQL a @sa_userconf_maps entry prefixed with
'ldap:' will load SpamAssassin configuration set using the
load_scoreonly_ldap() method.
- add some Sanesecurity.Foxhole false positives to the default list
@virus_name_to_spam_score_maps

- update amavis-milter to version 2.6.1:
* Fixed a bug when creating amavisd-new policy bank names

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2019-297=1



Package List:

- openSUSE Leap 15.0 (x86_64):

amavisd-new-2.11.1-lp150.5.3.1
amavisd-new-debuginfo-2.11.1-lp150.5.3.1
amavisd-new-debugsource-2.11.1-lp150.5.3.1
amavisd-new-docs-2.11.1-lp150.5.3.1


References:

https://www.suse.com/security/cve/CVE-2016-1238.html
https://bugzilla.suse.com/1123389
https://bugzilla.suse.com/987887

--