Description: | Summary: The remote host is missing an update for the 'containerd, docker, docker-runc, golang-github-docker-libnetwork, runc' package(s) announced via the SUSE-SU-2019:0495-1 advisory.
Vulnerability Insight: This update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc fixes the following issues:
Security issues fixed: CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899).
CVE-2018-16874: Fixed a vulnerabity in go get command which could allow directory traversal in GOPATH mode (bsc#1118898).
CVE-2018-16873: Fixed a vulnerability in go get command which could allow remote code execution when executed with -u in GOPATH mode (bsc#1118897).
CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container breakout (bsc#1121967).
Other changes and fixes: Update shell completion to use Group: System/Shells.
Add daemon.json file with rotation logs configuration (bsc#1114832)
Update to Docker 18.09.1-ce (bsc#1124308) and to runc 96ec2177ae84. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.
Update go requirements to >= go1.10
Use -buildmode=pie for tests and binary build (bsc#1048046 and bsc#1051429).
Remove the usage of 'cp -r' to reduce noise in the build logs.
Affected Software/OS: 'containerd, docker, docker-runc, golang-github-docker-libnetwork, runc' package(s) on SUSE Linux Enterprise Module for Containers 15, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15.
Solution: Please install the updated package(s).
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|