openSUSE-SU-2014:1411-1: moderate: Security update for docker, go
openSUSE Security Update: Security update for docker, go ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1411-1 Rating: moderate References: #898901 Cross-References: CVE-2014-5277 CVE-2014-7189 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Docker was updated to version 1.3.1 to fix two security issues and several other bugs. These security issues were fixed: - Prevent fallback to SSL protocols lower than TLS 1.0 for client, daemon and registry (CVE-2014-5277). - Secure HTTPS connection to registries with certificate verification and without HTTP fallback unless `--insecure-registry` is specified. These non-security issues were fixed: - Fix issue where volumes would not be shared - Fix issue with `--iptables=false` not automatically setting `--ip-masq=false` - Fix docker run output to non-TTY stdout - Fix escaping `$` for environment variables - Fix issue with lowercase `onbuild` Dockerfile instruction - Restrict envrionment variable expansion to `ENV`, `ADD`, `COPY`, `WORKDIR`, `EXPOSE`, `VOLUME` and `USER` - docker `exec` allows you to run additional processes inside existing containers - docker `create` gives you the ability to create a container via the cli without executing a process - `--security-opts` options to allow user to customize container labels and apparmor profiles - docker `ps` filters - Wildcard support to copy/add - Move production urls to get.docker.com from get.docker.io - Allocate ip address on the bridge inside a valid cidr - Use drone.io for pr and ci testing - Ability to setup an official registry mirror - Ability to save multiple images with docker `save` go was updated to version 1.3.3 to fix one security issue and several other bugs. This security issue was fixed: - TLS client authentication issue (CVE-2014-7189). These non-security issues were fixed: - Avoid stripping debuginfo on arm, it fails (and is not necessary) - Revert the /usr/share/go/contrib symlink as it caused problems during update. Moved all go sources to /usr/share/go/contrib/src instead of /usr/share/go/contrib/src/pkg and created pkg and src symlinks in contrib to add it to GOPATH - Fixed %go_contribsrcdir value - Copy temporary macros.go as go.macros to avoid it to be built - Do not modify Source: files, because that makes the .src.rpm being tied to one specific arch. - Removed extra src folder in /usr/share/go/contrib: the goal is to transform this folder into a proper entry for GOPATH. This folder is now linked to %{_libdir}/go/contrib - go requires gcc to build sources using cgo - tools-packaging.patch: Allow building cover and vet tools in $GOROOT_TARGET/pkg/tool instead of $GOROOT/pkg/tool. This will allow building go tools as a separate package Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2014-660 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): go-1.3.3-5.1 go-debuginfo-1.3.3-5.1 go-debugsource-1.3.3-5.1 go-doc-1.3.3-5.1 go-emacs-1.3.3-5.1 go-vim-1.3.3-5.1 - openSUSE 13.2 (x86_64): docker-1.3.1-5.2 docker-debuginfo-1.3.1-5.2 docker-debugsource-1.3.1-5.2 - openSUSE 13.2 (noarch): docker-bash-completion-1.3.1-5.2 docker-zsh-completion-1.3.1-5.2 References: http://support.novell.com/security/cve/CVE-2014-5277.html http://support.novell.com/security/cve/CVE-2014-7189.html https://bugzilla.suse.com/show_bug.cgi?id=898901
participants (1)
-
opensuse-security@opensuse.org