File _patchinfo of Package patchinfo.13548
<patchinfo incident="13548">
<issue tracker="bnc" id="1150397">docker regression with support for env variables to configure proxy</issue>
<issue tracker="bnc" id="1152308">VUL-0: CVE-2019-16884: runc: LSM bypass via malicious Docker image that mount over a /proc directory</issue>
<issue tracker="bnc" id="1153367">[trackerbug] Docker 19.03.3 update</issue>
<issue tracker="bnc" id="1158590"></issue>
<issue tracker="bnc" id="1143349">docker --userns-remap=default fails on-start</issue>
<issue id="1122469" tracker="bnc">nginx blocked by apparmor?</issue>
<issue tracker="cve" id="2019-16884"/>
<packager>cyphar</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork</summary>
<description>This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:
Security issue fixed:
- CVE-2019-16884: Fixed incomplete patch for LSM bypass via malicious Docker image that mount over a /proc directory (bsc#1152308).
Bug fixes:
- Update to Docker 19.03.5-ce (bsc#1158590).
- Update to Docker 19.03.3-ce (bsc#1153367).
- Update to Docker 19.03.2-ce (bsc#1150397).
- Fixed default installation such that --userns-remap=default works properly (bsc#1143349).
- Fixed nginx blocked by apparmor (bsc#1122469).
</description>
</patchinfo>