File _patchinfo of Package patchinfo.13548

<patchinfo incident="13548">
  <issue tracker="bnc" id="1150397">docker regression with support for env variables to configure proxy</issue>
  <issue tracker="bnc" id="1152308">VUL-0: CVE-2019-16884: runc: LSM bypass via malicious Docker image that mount over a /proc directory</issue>
  <issue tracker="bnc" id="1153367">[trackerbug] Docker 19.03.3 update</issue>
  <issue tracker="bnc" id="1158590"></issue>
  <issue tracker="bnc" id="1143349">docker --userns-remap=default fails on-start</issue>
  <issue id="1122469" tracker="bnc">nginx blocked by apparmor?</issue>
  <issue tracker="cve" id="2019-16884"/>
  <packager>cyphar</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork</summary>
  <description>This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Security issue fixed:

- CVE-2019-16884: Fixed incomplete patch for LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308). 

Bug fixes:

- Update to Docker 19.03.5-ce (bsc#1158590).
- Update to Docker 19.03.3-ce (bsc#1153367).
- Update to Docker 19.03.2-ce (bsc#1150397).
- Fixed default installation such that --userns-remap=default works properly (bsc#1143349).
- Fixed nginx blocked by apparmor (bsc#1122469).
</description>
</patchinfo>
openSUSE Build Service is sponsored by