File _patchinfo of Package patchinfo.40905

<patchinfo incident="40905">
  <issue tracker="bnc" id="1047218">trackerbug: packages do not build reproducibly from including build time</issue>
  <issue tracker="bnc" id="1200145">VUL-0: CVE-2022-31030: containerd: denial of service via invocation of the ExecSync API</issue>
  <issue tracker="bnc" id="1219438">VUL-0: CVE-2024-23653: buildkit: BuildKit API doesn't validate entitlement on container creation</issue>
  <issue tracker="bnc" id="1119634">go: multi-version installation is broken on version switch</issue>
  <issue tracker="bnc" id="954797">SLES12 SP1 - Deleting a docker container not possible, after the container start fails</issue>
  <issue tracker="bnc" id="1037436">docker exec -i leaks exec IDs</issue>
  <issue tracker="bnc" id="1134068">docker: update to 18.09.5</issue>
  <issue tracker="bnc" id="1015661">New patch breaks existing docker containers</issue>
  <issue tracker="bnc" id="1019251">Docker 1.12.5 -- Docker commands are failing -- Error: Cannot connect to the Docker daemon.</issue>
  <issue tracker="bnc" id="988707">SLES 12 SP2 Beta3 - iptable option "-iptable=false" in docker configuration needs to be removed</issue>
  <issue tracker="bnc" id="974208">libbtrfs-devel 4.5.1 breaks Docker build</issue>
  <issue tracker="bnc" id="1191355">[trackerbug] docker 20.10.9-ce update</issue>
  <issue tracker="bnc" id="1016992">Virtualization:containers/docker: Bug</issue>
  <issue tracker="bnc" id="968933">update docker to 1.10.2</issue>
  <issue tracker="bnc" id="908033">docker-registry needs to be included in sle 12 tech preview of docker</issue>
  <issue tracker="bnc" id="909710">VUL-0: CVE-2014-9357: docker: Escalation of privileges during decompression of LZMA archives</issue>
  <issue tracker="bnc" id="1214107">VUL-0: CVE-2023-28840: golang-github-docker-libnetwork,docker: Encrypted overlay network may be unauthenticated</issue>
  <issue tracker="bnc" id="1046024">Docker networking broken after boot</issue>
  <issue tracker="bnc" id="1181594">[trackerbug] Docker 20.10.2 update</issue>
  <issue tracker="bnc" id="1080978">caasp v2 to v3 upgrade fails</issue>
  <issue tracker="bnc" id="1150397">docker regression with support for env variables to configure proxy</issue>
  <issue tracker="bnc" id="965600">SLES12 SP1 - Static shared memory limit in container (docker)</issue>
  <issue tracker="bnc" id="1215323">[trackerbug] docker 24.0.6-ce update</issue>
  <issue tracker="bnc" id="1217513">VUL-0: docker: mitigate power-based side channel attacks (advisory GHSA-jq35-85cj-fj4p)</issue>
  <issue tracker="bnc" id="1112980">'ulimit: open files: cannot modify limit: Operation not permitted' when using cri-o</issue>
  <issue tracker="bnc" id="1114832">Running supportconfig on any node can take lots of resources, even fill the hard disk on big/long-running clusters</issue>
  <issue tracker="bnc" id="1028639">docker: conditional filtering not supported on libseccomp for leap42.1</issue>
  <issue tracker="bnc" id="984942">audit.rules in docker-1.9.1-58.1.x86_64.rpm has a syntax error</issue>
  <issue tracker="bnc" id="1210797">Growing docker mountpoint entries causes data unavailabillity</issue>
  <issue tracker="bnc" id="1009961">docker runc requirement calls for a runc downgrade</issue>
  <issue tracker="bnc" id="1099277">docker run --init fails because of apparmor</issue>
  <issue tracker="bnc" id="1057743">Docker Dead after upgrade from 1.12.6 to 17.04.0-ce</issue>
  <issue tracker="bnc" id="1182168">Regression in docker: Docker fails to start after update to version 19.03.15</issue>
  <issue tracker="bnc" id="938156">Update docker to 1.7.1</issue>
  <issue tracker="bnc" id="1205375">VUL-0: CVE-2022-36109: docker: supplementary group permissions bypass</issue>
  <issue tracker="bnc" id="1020806">docker update 1.12.5  ( SUSE-SLE-Module-Containers-12-2017-36) breaks containers</issue>
  <issue tracker="bnc" id="1128376">CaasP 3.0 worker nodes went into the NotReady State because the PLEG healthcheck</issue>
  <issue tracker="bnc" id="907012">VUL-0: CVE-2014-6407: docker: symbolic and hardlink issues leading to privilege escalation</issue>
  <issue tracker="bnc" id="1200022">[HUAWEI NOT FOR THE USA] RCA dockerd[20899]: panic: runtime error: invalid memory address or nil pointer dereference</issue>
  <issue tracker="bnc" id="958255">Docker creates strange apparmor profile</issue>
  <issue tracker="bnc" id="1066210">VUL-0: CVE-2017-14992: docker: Lack of content verification allows a remote attacker to cause DoS via crafted tar archive</issue>
  <issue tracker="bnc" id="1066801">VUL-0: CVE-2017-16539: docker: The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through17.03.2-ce does not block /proc/scsi pathnames, which allows attackers totrigger data loss (when certain older Linux kernels are used) b</issue>
  <issue tracker="bnc" id="1210141">docker.socket systemd configurations dosn't exist</issue>
  <issue tracker="bnc" id="1172377">VUL-0: CVE-2020-13401: docker: [trackerbug] Docker 19.03.11 update</issue>
  <issue tracker="bnc" id="1048046">docker binaries incorrectly built, contain TEXTRELS</issue>
  <issue tracker="bnc" id="1113313">need SLE12 containers module docker update to 18.06.1-ce as soon as possible</issue>
  <issue tracker="bnc" id="1121412">should disable to building kubic multibuilded subpackage on Leap</issue>
  <issue tracker="bnc" id="1139649">[trackerbug] Docker 18.09.7 update</issue>
  <issue tracker="bnc" id="1029630">docker does not wait for lvm on system startup</issue>
  <issue tracker="bnc" id="1213229">VUL-0: CVE-2023-29406: go1.19,go1.20: net/http: insufficient sanitization of Host header</issue>
  <issue tracker="bnc" id="1095817">containers packages fail randomly due to %check</issue>
  <issue tracker="bnc" id="1250508">Remove git-core as a dependency for docker</issue>
  <issue tracker="bnc" id="970637">update docker to 1.10.3</issue>
  <issue tracker="bnc" id="1051429">docker and runc failed to build with kernel 4.12 on ppc64le</issue>
  <issue tracker="bnc" id="1064781">docker version returns "unknown-version" for client</issue>
  <issue tracker="bnc" id="995102">Docker "migrator" prevents installing "docker", if it was not installed before</issue>
  <issue tracker="bnc" id="1175081">Docker on btrfs disables quotas globally</issue>
  <issue tracker="bnc" id="989566">update docker to 1.11.2</issue>
  <issue tracker="bnc" id="978260">Docker 1.11 requires runC and containerd binaries be called docker-*</issue>
  <issue tracker="bnc" id="976777">VUL-0: CVE-2016-3697: docker: Potential privilege escalation via confusion of usernames and UIDs</issue>
  <issue tracker="bnc" id="1065609">Docker logging a warning in messages file:"dangling symlink: /etc/SUSEConnect"</issue>
  <issue tracker="bnc" id="1072798">docker requires obsolete bridge-utils</issue>
  <issue tracker="bnc" id="1158590">[trackerbug] Docker 19.03.5 update</issue>
  <issue tracker="bnc" id="954737">docker daemon systemd unit uses deprecated -d option</issue>
  <issue tracker="bnc" id="909712">VUL-0: CVE-2014-9356: docker: Path traversal during processing of absolute symlinks</issue>
  <issue tracker="bnc" id="1086185">Kubelet: reserve compute resources for system daemons</issue>
  <issue tracker="bnc" id="907014">VUL-0: CVE-2014-6408: docker: potential container escalation</issue>
  <issue tracker="bnc" id="1219268">VUL-0: CVE-2024-23652: docker: arbitrary deletion of files</issue>
  <issue tracker="bnc" id="942370">update docker to 1.8.1</issue>
  <issue tracker="bnc" id="1190670">[Build 20210917][glibc2.34] docker blocks clone3 syscall</issue>
  <issue tracker="bnc" id="1032287">Missing Docker systemd configuration</issue>
  <issue tracker="bnc" id="953182">docker manual page not available on SLES 12 SP1 / Containers Module on POWER</issue>
  <issue tracker="bnc" id="913211">Docker: cannot use devicemapper driver when e2fsprogs is not installed</issue>
  <issue tracker="bnc" id="1124308">docker: update to 18.09.1</issue>
  <issue tracker="bnc" id="1184768">[trackerbug] Docker 20.10.6 update</issue>
  <issue tracker="bnc" id="977394">update go to 1.6</issue>
  <issue tracker="bnc" id="1096726">VUL-0: CVE-2018-15664: docker:  'docker cp' is vulnerable to symlink-exchange race attacks</issue>
  <issue tracker="bnc" id="1206065">[trackerbug] Docker 20.10.21-ce update</issue>
  <issue tracker="bnc" id="1004490">update docker to 1.12.2</issue>
  <issue tracker="bnc" id="1193930">VUL-0: CVE-2021-43565: kubernetes,docker,kubernetes-1.18,kubevirt: golang.org/x/crypto: empty plaintext packet causes panic</issue>
  <issue tracker="bnc" id="1142413">[trackerbug] Docker 19.03.0 update</issue>
  <issue tracker="bnc" id="1118897">VUL-0: CVE-2018-16873: go: cmd/go: remote command execution</issue>
  <issue tracker="bnc" id="1122469">nginx blocked by apparmor?</issue>
  <issue tracker="bnc" id="1121768">VUL-0: CVE-2018-20699: docker: denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value</issue>
  <issue tracker="bnc" id="1247362">[EAR - NOT FOR USA Citizens] docker-stable: Merged files not be released after docker export</issue>
  <issue tracker="bnc" id="1084533">3rd party registries used the default Docker certificate instead of the one specified for the registry</issue>
  <issue tracker="bnc" id="980555">zypper up error installing docker 1.10.3</issue>
  <issue tracker="bnc" id="995620">docker-proxy missing from docker 1.12.x package</issue>
  <issue tracker="bnc" id="1104821">Make cri-o default for kubernetes on Kubic</issue>
  <issue tracker="bnc" id="1191434">VUL-0: CVE-2021-41091: docker: A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories wit</issue>
  <issue tracker="bnc" id="1030702">docker fails to start containers: error creating secret</issue>
  <issue tracker="bnc" id="1176708">[trackerbug] Docker 19.03.13 update</issue>
  <issue tracker="bnc" id="1034063">Containers cannot resolve DNS if docker host uses 127.0.0.1 as resolver</issue>
  <issue tracker="bnc" id="1178760">VUL-0: CVE-2020-12912: kernel-source: AMD: unprivileged access to RAPL allows for side channel attacks</issue>
  <issue tracker="bnc" id="1055676">docker operation not permitted when using --userns-remap=obsservicerun:obsrun</issue>
  <issue tracker="bnc" id="1102522">Docker v18.06-ce upgrade.</issue>
  <issue tracker="bnc" id="963142">SLES 12 SP1 - Copy one or more  file to docker container via "docker cp" causes an error when removing the container later on</issue>
  <issue tracker="bnc" id="996015">[TRACKERBUG] update docker to 1.12.1</issue>
  <issue tracker="bnc" id="1180401">[Build 20201228-1] Failed to program NAT chain: INVALID_ZONE: docker</issue>
  <issue tracker="bnc" id="1085117">man pages for individual docker CLI commands missing</issue>
  <issue tracker="bnc" id="956434">Upgrade to docker 1.9.1</issue>
  <issue tracker="bnc" id="1212368">[trackerbug] docker 24.0.2-ce update</issue>
  <issue tracker="bnc" id="1153367">[trackerbug] Docker 19.03.3 update</issue>
  <issue tracker="bnc" id="983015">The cgroup changes after docker-1.5.0-23.1 increases latency when running containers on SLES12</issue>
  <issue tracker="bnc" id="1069468">Packages should no longer use /var/adm/fillup-templates</issue>
  <issue tracker="bnc" id="1181732">VUL-1: CVE-2021-21284: docker: potential privilege escalation when the root user in the remapped namespace has access to the host filesystem</issue>
  <issue tracker="bnc" id="1170415">VUL-0: CVE-2020-8694: kernel-source: Intel RAPL sidechannel aka PLATYPUS attack</issue>
  <issue tracker="bnc" id="993847">Pin component dependencies for Docker &gt;= 1.11.0</issue>
  <issue tracker="bnc" id="1181677">remove docker-runc and docker-proxy packages plus unneeded -kubic flavours</issue>
  <issue tracker="bnc" id="949660">VUL-0: CVE-2014-8178 CVE-2014-8179: docker: 1.8.3 fixes security issues</issue>
  <issue tracker="bnc" id="1037607">The image from April 28th is broken: docker fails to run containers</issue>
  <issue tracker="bnc" id="1105000">harmonise docker and docker-kubic packaging</issue>
  <issue tracker="bnc" id="1143349">docker --userns-remap=default fails on-start</issue>
  <issue tracker="bnc" id="1250596">docker-stable changelog does not reference old CVEs</issue>
  <issue tracker="bnc" id="1100727">Can't run docker on SLE15 ppc64le: error while loading shared libraries: R_PPC64_ADDR16_HA re10d830328 for symbol `' out of range</issue>
  <issue tracker="bnc" id="1032644">docker requires lvm2, but we don't use/need/support that</issue>
  <issue tracker="bnc" id="1191334">VUL-0: CVE-2021-41092: docker: exposed user credentials with a misconfigured configuration file</issue>
  <issue tracker="bnc" id="1016307">update docker to 1.12.5</issue>
  <issue tracker="bnc" id="920645">[yast2-docker] error: connection refused - connect(2) for /var/run/docker.sock</issue>
  <issue tracker="bnc" id="885209">VUL-0: CVE-2014-3499: docker: systemd socket activation results in privilege escalation</issue>
  <issue tracker="bnc" id="1021227">Docker devicemapper support for deferred removal/deletion</issue>
  <issue tracker="bnc" id="965918">update docker to 1.10.0</issue>
  <issue tracker="bnc" id="999582">VMware snapshots not working with running docker containers inside the VM</issue>
  <issue tracker="bnc" id="909709">VUL-0: CVE-2014-9358: docker: Path traversal and spoofing opportunities presented through image identifiers</issue>
  <issue tracker="bnc" id="930235">VUL-0: CVE-2015-3630, CVE-2015-3631, CVE-2015-3627,CVE-2015-3629: docker: various security issues</issue>
  <issue tracker="bnc" id="1069758">Update Docker to 17.09.1_ce</issue>
  <issue tracker="bnc" id="1211578">[trackerbug] docker 23.0.6-ce update</issue>
  <issue tracker="bnc" id="946653">update docker to 1.8.2</issue>
  <issue tracker="bnc" id="1026827">systemd TasksMax default throttles docker</issue>
  <issue tracker="bnc" id="1181730">VUL-0: CVE-2021-21285: docker: pulling a malformed Docker image manifest crashes the dockerd daemon</issue>
  <issue tracker="bnc" id="1012568">VUL-0: CVE-2016-9962: runc: container escape vulnerability</issue>
  <issue tracker="bnc" id="1197517">VUL-0: CVE-2022-24769: docker, containerd: moby: Default inheritable capabilities for linux container should be empty</issue>
  <issue tracker="bnc" id="1100331">VUL-1: CVE-2018-10892: docker: container breakout without selinux in enforcing mode</issue>
  <issue tracker="bnc" id="1074971">[TRACKERBUG] Enabling mirroring of private  registries with docker</issue>
  <issue tracker="bnc" id="1115464">Out of date package: openSUSE:Factory/docker is out of date</issue>
  <issue tracker="bnc" id="995058">[TRACKERBUG] update docker to 1.12.0 (and runc and containerd)</issue>
  <issue tracker="bnc" id="959405">add audit rules for docker daemon</issue>
  <issue tracker="bnc" id="913213">Docker:   issues with api bind/volumesfrom on start</issue>
  <issue tracker="bnc" id="1192814">[trackerbug] docker 20.10.11-ce update</issue>
  <issue tracker="bnc" id="1183855">When stopping docker btrfs quotas are removed</issue>
  <issue tracker="bnc" id="1118898">VUL-0: CVE-2018-16874: go: cmd/go: directory traversal</issue>
  <issue tracker="bnc" id="1208074">[trackerbug] docker 23.0.0-ce update</issue>
  <issue tracker="bnc" id="1058173">Build docker on SUSE:SLE-12-SP2:Update</issue>
  <issue tracker="bnc" id="988408">update to gcc6-go for ppc64le/s390x</issue>
  <issue tracker="bnc" id="1191121">VUL-0: CVE-2021-41103: containerd: file access to local users</issue>
  <issue tracker="bnc" id="1142160">VUL-0: CVE-2019-13509: docker: In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario</issue>
  <issue tracker="bnc" id="1038493">Feature: Allow installing multiple go compiler versions</issue>
  <issue tracker="bnc" id="942369">update docker to 1.8.1</issue>
  <issue tracker="bnc" id="1182947">[trackerbug] Docker 20.10.5 update</issue>
  <issue tracker="bnc" id="1038476">"zypper in docker" fails with "docker: command not found"</issue>
  <issue tracker="bnc" id="1085380">docker-init: missing binary (when using docker run --init parameter)</issue>
  <issue tracker="bnc" id="1059011">Docker service fails to come up after hard reboot of machine with error 'failed to cleanup ipc mounts'</issue>
  <issue tracker="bnc" id="1118899">VUL-0: CVE-2018-16875: go: crypto/x509: CPU denial of service</issue>
  <issue tracker="bnc" id="1197284">VUL-0: CVE-2022-27191: docker, containerd, kubernetes, helm, helm3, etcd: crash in a golang.org/x/crypto/ssh server</issue>
  <issue tracker="bnc" id="1182476">Docker wrong SemVer version string</issue>
  <issue tracker="bnc" id="1034053">update docker to v17.04.0-ce</issue>
  <issue tracker="bnc" id="968972">let docker manage the cgroups of the processes that it launches without systemd</issue>
  <issue tracker="bnc" id="1170446">VUL-0: CVE-2020-8695: ucode-intel: Intel RAPL sidechannel (SGX part)</issue>
  <issue tracker="bnc" id="1089732">Virtualization:containers/docker: SLES_12: Docker not running due to missing apparmor profile</issue>
  <issue tracker="bnc" id="1213500">[trackerbug] docker 24.0.4-ce update</issue>
  <issue tracker="bnc" id="1178801">[Build 20201113] firewalld: failure in docker_compose</issue>
  <issue tracker="bnc" id="987198">Docker installs kernel-xen dependency on KVM</issue>
  <issue tracker="bnc" id="950931">Unable to build docker on SLES 12 SP1 PPC64LE from SRC RPM</issue>
  <issue tracker="bnc" id="1191015">VUL-0: CVE-2021-41089: docker: "cp" can chmod host files</issue>
  <issue tracker="bnc" id="1118990">L3-Question: Docker 18.06-ce can not commit images with &gt;23GB files</issue>
  <issue tracker="bnc" id="1028638">docker: conditional filtering not supported on libseccomp for sle12 or sle12sp1</issue>
  <issue tracker="bnc" id="1188447">Wrong After in docker.service</issue>
  <issue tracker="bnc" id="1193273">VUL-1: CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion</issue>
  <issue tracker="bnc" id="1181641">After docker update, containerd-shim-runc-v2 cannot find "runc" binary</issue>
  <issue tracker="bnc" id="964673">SLES 12 SP1 - Killing 1000 containers corrupts local-kv.db</issue>
  <issue tracker="bnc" id="954812">Please update Docker to 1.9 (as of today)</issue>
  <issue tracker="bnc" id="1007249">VUL-0: CVE-2016-8867: docker: Fix ambient capability usage in containers</issue>
  <issue tracker="bnc" id="1180243">[trackerbug] Docker 19.03.14 update</issue>
  <issue tracker="bnc" id="964468">gcc-go can no longer compile Docker (master)</issue>
  <issue tracker="bnc" id="1073877">Docker fails to stop container</issue>
  <issue tracker="bnc" id="1045628">Partner-L3: unusual number of docker /dev/mapper entries in sar</issue>
  <issue tracker="bnc" id="1108038">docker hard-requires git-core</issue>
  <issue tracker="bnc" id="931301">Fix regression introduced by docker 1.6.1</issue>
  <issue tracker="bnc" id="1240150">rootless docker fails on SLES</issue>
  <issue tracker="bnc" id="1219267">VUL-0: CVE-2024-23651: docker: race condition in mount</issue>
  <issue tracker="bnc" id="1001161">Docker: "--hostname" - set hostname and domainname separately</issue>
  <issue tracker="bnc" id="1213120">[trackerbug] docker 24.0.3-ce update</issue>
  <issue tracker="bnc" id="1157330">Docker containers become partially unresponsive</issue>
  <issue tracker="bnc" id="1029320">docker does not cleanup lvm thinpool properly</issue>
  <issue tracker="bnc" id="1138920">EMU: old configs in daemon.json were removed</issue>
  <issue tracker="bnc" id="1214109">VUL-0: CVE-2023-28842: docker,golang-github-docker-libnetwork: Encrypted overlay network with a single endpoint is unauthenticated</issue>
  <issue tracker="bnc" id="935570">Upgrade to docker 1.7.0</issue>
  <issue tracker="bnc" id="1214108">VUL-0: CVE-2023-28841: docker,golang-github-docker-libnetwork: Encrypted overlay network traffic may be unencrypted</issue>
  <issue tracker="bnc" id="1174075">Changing %{_libexecdir} breaks some packages which are misusing the macro</issue>
  <issue tracker="bnc" id="1128746">Containers module is not available for ARM</issue>
  <issue tracker="cve" id="2024-23651"/>
  <issue tracker="cve" id="2014-6408"/>
  <issue tracker="cve" id="2020-13401"/>
  <issue tracker="cve" id="2021-41103"/>
  <issue tracker="cve" id="2021-21285"/>
  <issue tracker="cve" id="2021-43565"/>
  <issue tracker="cve" id="2019-13509"/>
  <issue tracker="cve" id="2014-5277"/>
  <issue tracker="cve" id="2014-8179"/>
  <issue tracker="cve" id="2024-2365"/>
  <issue tracker="cve" id="2021-41190"/>
  <issue tracker="cve" id="2018-16875"/>
  <issue tracker="cve" id="2018-10892"/>
  <issue tracker="cve" id="2015-3629"/>
  <issue tracker="cve" id="2021-41091"/>
  <issue tracker="cve" id="2015-3631"/>
  <issue tracker="cve" id="2014-9357"/>
  <issue tracker="cve" id="2024-23652"/>
  <issue tracker="cve" id="2023-28840"/>
  <issue tracker="cve" id="2018-16873"/>
  <issue tracker="cve" id="2014-9356"/>
  <issue tracker="cve" id="2015-3627"/>
  <issue tracker="cve" id="2022-27191"/>
  <issue tracker="cve" id="2024-23653"/>
  <issue tracker="cve" id="2024-41110"/>
  <issue tracker="cve" id="2019-14271"/>
  <issue tracker="cve" id="2018-15664"/>
  <issue tracker="cve" id="2017-16539"/>
  <issue tracker="cve" id="2014-9358"/>
  <issue tracker="cve" id="2021-41089"/>
  <issue tracker="cve" id="2017-14992"/>
  <issue tracker="cve" id="2024-29018"/>
  <issue tracker="cve" id="2022-24769"/>
  <issue tracker="cve" id="2025-22869"/>
  <issue tracker="cve" id="2014-8178"/>
  <issue tracker="cve" id="2014-3499"/>
  <issue tracker="cve" id="2022-36109"/>
  <issue tracker="cve" id="2016-9962"/>
  <issue tracker="cve" id="2021-21284"/>
  <issue tracker="cve" id="2018-20699"/>
  <issue tracker="cve" id="2020-12912"/>
  <issue tracker="cve" id="2020-8695"/>
  <issue tracker="cve" id="2020-15257"/>
  <issue tracker="cve" id="2016-3697"/>
  <issue tracker="cve" id="2018-16874"/>
  <issue tracker="cve" id="2021-41092"/>
  <issue tracker="cve" id="2025-22868"/>
  <issue tracker="cve" id="2020-8694"/>
  <issue tracker="cve" id="2023-28841"/>
  <issue tracker="cve" id="2023-28842"/>
  <issue tracker="cve" id="2016-8867"/>
  <issue tracker="cve" id="2014-6407"/>
  <issue tracker="cve" id="2015-3630"/>
  <issue tracker="jsc" id="SLE-16460"/>
  <issue tracker="fate" id="325877"/>
  <issue tracker="fate" id="324652"/>
  <packager>cyphar</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for docker-stable</summary>
  <description>This update for docker-stable fixes the following issues:

- Include historical changelog data from before the docker-stable fork. The
  initial changelog entry did technically provide all the necessary
  information, but our CVE tracking tools do not understand how the package is
  forked and so it seems that this package does not include fixes for ~12 years
  of updates. So, include a copy of the original package's changelog up until
  the fork point. (bsc#1250596)

- Remove git-core recommends on SLE. Most SLE systems have
  installRecommends=yes by default and thus end up installing git with Docker.
  bsc#1250508

  This feature is mostly intended for developers ("docker build git://") so
  most users already have the dependency installed, and the error when git is
  missing is fairly straightforward (so they can easily figure out what they
  need to install).

- Backport &lt;https://github.com/moby/moby/pull/48517&gt;. bsc#1247362

- Update to docker-buildx v0.25.0. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.25.0&gt;

- Do not try to inject SUSEConnect secrets when in Rootless Docker mode, as
  Docker does not have permission to access the host zypper credentials in this
  mode (and unprivileged users cannot disable the feature using
  /etc/docker/suse-secrets-enable.) bsc#1240150

- Initial docker-stable fork, forked from Docker 24.0.7-ce release
  (packaged on 2024-02-14). The original changelog is included below for
  historical reference.
</description>
</patchinfo>
openSUSE Build Service is sponsored by