SUSE 5022 Published by

A kubernetes security update has been released for openSUSE Leap 15.1.



security-announce: openSUSE-SU-2020:0554-1: important: Security update for kubernetes


openSUSE Security Update: Security update for kubernetes
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0554-1
Rating: important
References: #1039663 #1042383 #1042387 #1057277 #1059207
#1061027 #1065972 #1069469 #1084765 #1084766
#1085009 #1086185 #1086412 #1095131 #1095154
#1096773 #1097473 #1100838 #1101010 #1104598
#1104821 #1112980 #1118897 #1118898 #1136403
#1144065 #1155323 #1161056 #1161179
Cross-References: CVE-2016-5195 CVE-2016-8859 CVE-2017-1002101
CVE-2018-1002105 CVE-2018-16873 CVE-2018-16874
CVE-2019-10214
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves 7 vulnerabilities and has 22 fixes is
now available.

Description:

This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap
15.1.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-554=1


Package List:

- openSUSE Leap 15.1 (x86_64):

cri-o-1.17.1-lp151.2.2
cri-o-kubeadm-criconfig-1.17.1-lp151.2.2
cri-tools-1.18.0-lp151.2.1
go1.14-1.14-lp151.6.1
go1.14-doc-1.14-lp151.6.1
go1.14-race-1.14-lp151.6.1
kubernetes-apiserver-1.18.0-lp151.5.1
kubernetes-client-1.18.0-lp151.5.1
kubernetes-controller-manager-1.18.0-lp151.5.1
kubernetes-kubeadm-1.18.0-lp151.5.1
kubernetes-kubelet-common-1.18.0-lp151.5.1
kubernetes-kubelet1.17-1.18.0-lp151.5.1
kubernetes-kubelet1.18-1.18.0-lp151.5.1
kubernetes-master-1.18.0-lp151.5.1
kubernetes-node-1.18.0-lp151.5.1
kubernetes-proxy-1.18.0-lp151.5.1
kubernetes-scheduler-1.18.0-lp151.5.1

References:

  https://www.suse.com/security/cve/CVE-2016-5195.html
  https://www.suse.com/security/cve/CVE-2016-8859.html
  https://www.suse.com/security/cve/CVE-2017-1002101.html
  https://www.suse.com/security/cve/CVE-2018-1002105.html
  https://www.suse.com/security/cve/CVE-2018-16873.html
  https://www.suse.com/security/cve/CVE-2018-16874.html
  https://www.suse.com/security/cve/CVE-2019-10214.html
  https://bugzilla.suse.com/1039663
  https://bugzilla.suse.com/1042383
  https://bugzilla.suse.com/1042387
  https://bugzilla.suse.com/1057277
  https://bugzilla.suse.com/1059207
  https://bugzilla.suse.com/1061027
  https://bugzilla.suse.com/1065972
  https://bugzilla.suse.com/1069469
  https://bugzilla.suse.com/1084765
  https://bugzilla.suse.com/1084766
  https://bugzilla.suse.com/1085009
  https://bugzilla.suse.com/1086185
  https://bugzilla.suse.com/1086412
  https://bugzilla.suse.com/1095131
  https://bugzilla.suse.com/1095154
  https://bugzilla.suse.com/1096773
  https://bugzilla.suse.com/1097473
  https://bugzilla.suse.com/1100838
  https://bugzilla.suse.com/1101010
  https://bugzilla.suse.com/1104598
  https://bugzilla.suse.com/1104821
  https://bugzilla.suse.com/1112980
  https://bugzilla.suse.com/1118897
  https://bugzilla.suse.com/1118898
  https://bugzilla.suse.com/1136403
  https://bugzilla.suse.com/1144065
  https://bugzilla.suse.com/1155323
  https://bugzilla.suse.com/1161056
  https://bugzilla.suse.com/1161179