File _patchinfo of Package patchinfo.31639

<patchinfo incident="31639">
  <issue tracker="bnc" id="1170415">VUL-0: CVE-2020-8694: kernel-source: Intel RAPL sidechannel aka PLATYPUS attack</issue>
  <issue tracker="bnc" id="1170446">VUL-0: CVE-2020-8695: ucode-intel: Intel RAPL sidechannel (SGX part)</issue>
  <issue tracker="bnc" id="1178760">VUL-0: CVE-2020-12912: kernel-source: AMD: unprivileged access to RAPL allows for side channel attacks</issue>
  <issue tracker="bnc" id="1217513">VUL-0: docker: mitigate power-based side channel attacks (advisory GHSA-jq35-85cj-fj4p)</issue>
  <issue tracker="cve" id="2020-12912"/>
  <issue tracker="cve" id="2020-8694"/>
  <issue tracker="cve" id="2020-8695"/>
  <packager>cyphar</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for containerd, docker, runc</summary>
  <description>This update for containerd, docker, runc fixes the following issues:

containerd:

-Update to containerd v1.7.8. Upstream release notes:

  https://github.com/containerd/containerd/releases/tag/v1.7.8

docker:

- Update to Docker 24.0.7-ce. See upstream changelong online at
  https://docs.docker.com/engine/release-notes/24.0/#2407 (bsc#1217513)
  * Deny containers access to /sys/devices/virtual/powercap by default.
    - CVE-2020-8694 bsc#1170415
    - CVE-2020-8695 bsc#1170446
    - CVE-2020-12912 bsc#1178760

runc:

- Update to runc v1.1.10. Upstream changelog is available from
  https://github.com/opencontainers/runc/releases/tag/v1.1.10
</description>
  <message>Updating docker will restart the docker service, which may stop some of your docker containers. Do you want to proceed with the update?</message>
</patchinfo>
openSUSE Build Service is sponsored by