File _patchinfo of Package patchinfo.31639
<patchinfo incident="31639">
<issue tracker="bnc" id="1170415">VUL-0: CVE-2020-8694: kernel-source: Intel RAPL sidechannel aka PLATYPUS attack</issue>
<issue tracker="bnc" id="1170446">VUL-0: CVE-2020-8695: ucode-intel: Intel RAPL sidechannel (SGX part)</issue>
<issue tracker="bnc" id="1178760">VUL-0: CVE-2020-12912: kernel-source: AMD: unprivileged access to RAPL allows for side channel attacks</issue>
<issue tracker="bnc" id="1217513">VUL-0: docker: mitigate power-based side channel attacks (advisory GHSA-jq35-85cj-fj4p)</issue>
<issue tracker="cve" id="2020-12912"/>
<issue tracker="cve" id="2020-8694"/>
<issue tracker="cve" id="2020-8695"/>
<packager>cyphar</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for containerd, docker, runc</summary>
<description>This update for containerd, docker, runc fixes the following issues:
containerd:
-Update to containerd v1.7.8. Upstream release notes:
https://github.com/containerd/containerd/releases/tag/v1.7.8
docker:
- Update to Docker 24.0.7-ce. See upstream changelong online at
https://docs.docker.com/engine/release-notes/24.0/#2407 (bsc#1217513)
* Deny containers access to /sys/devices/virtual/powercap by default.
- CVE-2020-8694 bsc#1170415
- CVE-2020-8695 bsc#1170446
- CVE-2020-12912 bsc#1178760
runc:
- Update to runc v1.1.10. Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.10
</description>
<message>Updating docker will restart the docker service, which may stop some of your docker containers. Do you want to proceed with the update?</message>
</patchinfo>