File _patchinfo of Package patchinfo.18164

<patchinfo incident="18164">
  <issue tracker="bnc" id="1177598">VUL-0: CVE-2020-15157: containerd: credentials leaking during image pull</issue>
  <issue tracker="bnc" id="1181732">VUL-1: CVE-2021-21284: docker: potential privilege escalation when the root user in the remapped namespace has access to the host filesystem</issue>
  <issue tracker="bnc" id="1153367">[trackerbug] Docker 19.03.3 update</issue>
  <issue tracker="bnc" id="1181730">VUL-0: CVE-2021-21285: docker: pulling a malformed Docker image manifest crashes the dockerd daemon</issue>
  <issue tracker="bnc" id="1180401">[Build 20201228-1] Failed to program NAT chain: INVALID_ZONE: docker</issue>
  <issue tracker="bnc" id="1178801">[Build 20201113] firewalld: failure in docker_compose</issue>
  <issue tracker="bnc" id="1158590">[trackerbug] Docker 19.03.5 update</issue>
  <issue tracker="bnc" id="1065609">Docker logging a warning in messages file:"dangling symlink: /etc/SUSEConnect"</issue>
  <issue tracker="bnc" id="1176708">[trackerbug] Docker 19.03.13 update</issue>
  <issue tracker="bnc" id="1157330">Docker containers become partially unresponsive</issue>
  <issue tracker="cve" id="2021-21285"/>
  <issue tracker="cve" id="2021-21284"/>
  <issue tracker="cve" id="2020-15157"/>
  <packager>cyphar</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork</summary>
  <description>This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Update Docker to 19.03.15-ce:

- CVE-2021-21284: potential privilege escalation when the root user in the remapped namespace has access to the host filesystem (bsc#1181732)
- CVE-2021-21285: malformed Docker image manifest crashes the dockerd daemon (bsc#1181730)
- CVE-2020-15157: containerd: credentials leaking during image pull (bsc#1177598)
</description>
</patchinfo>
openSUSE Build Service is sponsored by