openSUSE-SU-2019:0295-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:0295-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2019:0295-1
Related
Published
2019-03-23T11:11:59Z
Modified
2019-03-23T11:11:59Z
Summary
Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc
Details

This update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc fixes the following issues:

Security issues fixed:

  • CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899).
  • CVE-2018-16874: Fixed a vulnerabity in go get command which could allow directory traversal in GOPATH mode (bsc#1118898).
  • CVE-2018-16873: Fixed a vulnerability in go get command which could allow remote code execution when executed with -u in GOPATH mode (bsc#1118897).
  • CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container breakout (bsc#1121967).

Other changes and fixes:

  • Update shell completion to use Group: System/Shells.
  • Add daemon.json file with rotation logs configuration (bsc#1114832)
  • Update to Docker 18.09.1-ce (bsc#1124308) and to to runc 96ec2177ae84. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.
  • Update go requirements to >= go1.10
  • Use -buildmode=pie for tests and binary build (bsc#1048046 and bsc#1051429).
  • Remove the usage of 'cp -r' to reduce noise in the build logs.

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages