Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc
Details
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc fixes the following issues:
Security issues fixed:
CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899).
CVE-2018-16874: Fixed a vulnerabity in go get command which could allow directory traversal in GOPATH mode (bsc#1118898).
CVE-2018-16873: Fixed a vulnerability in go get command which could allow remote code execution when executed with -u in GOPATH mode (bsc#1118897).
CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container
breakout (bsc#1121967).
Other changes and bug fixes:
Update shell completion to use Group: System/Shells.
Add daemon.json file with rotation logs configuration (bsc#1114832)
Update to Docker 18.09.1-ce (bsc#1124308) and to to runc 96ec2177ae84.
See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.
Disable leap based builds for kubic flavor (bsc#1121412).
Allow users to explicitly specify the NIS domain name of a container (bsc#1001161).
Update docker.service to match upstream and avoid rlimit problems (bsc#1112980).
Update go requirements to >= go1.10
Use -buildmode=pie for tests and binary build (bsc#1048046 and bsc#1051429).
Remove the usage of 'cp -r' to reduce noise in the build logs.