File _patchinfo of Package patchinfo.40904

<patchinfo incident="40904">
  <issue tracker="bnc" id="1026827">systemd TasksMax default throttles docker</issue>
  <issue tracker="bnc" id="1174075">Changing %{_libexecdir} breaks some packages which are misusing the macro</issue>
  <issue tracker="bnc" id="1143349">docker --userns-remap=default fails on-start</issue>
  <issue tracker="bnc" id="1170415">VUL-0: CVE-2020-8694: kernel-source: Intel RAPL sidechannel aka PLATYPUS attack</issue>
  <issue tracker="bnc" id="1191015">VUL-0: CVE-2021-41089: docker: "cp" can chmod host files</issue>
  <issue tracker="bnc" id="1045628">Partner-L3: unusual number of docker /dev/mapper entries in sar</issue>
  <issue tracker="bnc" id="1118899">VUL-0: CVE-2018-16875: go: crypto/x509: CPU denial of service</issue>
  <issue tracker="bnc" id="965918">update docker to 1.10.0</issue>
  <issue tracker="bnc" id="1188447">Wrong After in docker.service</issue>
  <issue tracker="bnc" id="1210797">Growing docker mountpoint entries causes data unavailabillity</issue>
  <issue tracker="bnc" id="938156">Update docker to 1.7.1</issue>
  <issue tracker="bnc" id="1085380">docker-init: missing binary (when using docker run --init parameter)</issue>
  <issue tracker="bnc" id="1193930">VUL-0: CVE-2021-43565: kubernetes,docker,kubernetes-1.18,kubevirt: golang.org/x/crypto: empty plaintext packet causes panic</issue>
  <issue tracker="bnc" id="964673">SLES 12 SP1 - Killing 1000 containers corrupts local-kv.db</issue>
  <issue tracker="bnc" id="1099277">docker run --init fails because of apparmor</issue>
  <issue tracker="bnc" id="920645">[yast2-docker] error: connection refused - connect(2) for /var/run/docker.sock</issue>
  <issue tracker="bnc" id="1197517">VUL-0: CVE-2022-24769: docker, containerd: moby: Default inheritable capabilities for linux container should be empty</issue>
  <issue tracker="bnc" id="1034053">update docker to v17.04.0-ce</issue>
  <issue tracker="bnc" id="1055676">docker operation not permitted when using --userns-remap=obsservicerun:obsrun</issue>
  <issue tracker="bnc" id="1095817">containers packages fail randomly due to %check</issue>
  <issue tracker="bnc" id="949660">VUL-0: CVE-2014-8178 CVE-2014-8179: docker: 1.8.3 fixes security issues</issue>
  <issue tracker="bnc" id="1191434">VUL-0: CVE-2021-41091: docker: A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories wit</issue>
  <issue tracker="bnc" id="1191355">[trackerbug] docker 20.10.9-ce update</issue>
  <issue tracker="bnc" id="1032644">docker requires lvm2, but we don't use/need/support that</issue>
  <issue tracker="bnc" id="1158590">[trackerbug] Docker 19.03.5 update</issue>
  <issue tracker="bnc" id="1206065">[trackerbug] Docker 20.10.21-ce update</issue>
  <issue tracker="bnc" id="1100331">VUL-1: CVE-2018-10892: docker: container breakout without selinux in enforcing mode</issue>
  <issue tracker="bnc" id="1197284">VUL-0: CVE-2022-27191: docker, containerd, kubernetes, helm, helm3, etcd: crash in a golang.org/x/crypto/ssh server</issue>
  <issue tracker="bnc" id="1051429">docker and runc failed to build with kernel 4.12 on ppc64le</issue>
  <issue tracker="bnc" id="1178760">VUL-0: CVE-2020-12912: kernel-source: AMD: unprivileged access to RAPL allows for side channel attacks</issue>
  <issue tracker="bnc" id="1032287">Missing Docker systemd configuration</issue>
  <issue tracker="bnc" id="980555">zypper up error installing docker 1.10.3</issue>
  <issue tracker="bnc" id="931301">Fix regression introduced by docker 1.6.1</issue>
  <issue tracker="bnc" id="885209">VUL-0: CVE-2014-3499: docker: systemd socket activation results in privilege escalation</issue>
  <issue tracker="bnc" id="1153367">[trackerbug] Docker 19.03.3 update</issue>
  <issue tracker="bnc" id="1065609">Docker logging a warning in messages file:"dangling symlink: /etc/SUSEConnect"</issue>
  <issue tracker="bnc" id="965600">SLES12 SP1 - Static shared memory limit in container (docker)</issue>
  <issue tracker="bnc" id="953182">docker manual page not available on SLES 12 SP1 / Containers Module on POWER</issue>
  <issue tracker="bnc" id="976777">VUL-0: CVE-2016-3697: docker: Potential privilege escalation via confusion of usernames and UIDs</issue>
  <issue tracker="bnc" id="942369">update docker to 1.8.1</issue>
  <issue tracker="bnc" id="1104821">Make cri-o default for kubernetes on Kubic</issue>
  <issue tracker="bnc" id="1020806">docker update 1.12.5  ( SUSE-SLE-Module-Containers-12-2017-36) breaks containers</issue>
  <issue tracker="bnc" id="1182168">Regression in docker: Docker fails to start after update to version 19.03.15</issue>
  <issue tracker="bnc" id="1200022">[HUAWEI NOT FOR THE USA] RCA dockerd[20899]: panic: runtime error: invalid memory address or nil pointer dereference</issue>
  <issue tracker="bnc" id="1150397">docker regression with support for env variables to configure proxy</issue>
  <issue tracker="bnc" id="1128746">Containers module is not available for ARM</issue>
  <issue tracker="bnc" id="989566">update docker to 1.11.2</issue>
  <issue tracker="bnc" id="1029320">docker does not cleanup lvm thinpool properly</issue>
  <issue tracker="bnc" id="1096726">VUL-0: CVE-2018-15664: docker:  'docker cp' is vulnerable to symlink-exchange race attacks</issue>
  <issue tracker="bnc" id="954737">docker daemon systemd unit uses deprecated -d option</issue>
  <issue tracker="bnc" id="1080978">caasp v2 to v3 upgrade fails</issue>
  <issue tracker="bnc" id="958255">Docker creates strange apparmor profile</issue>
  <issue tracker="bnc" id="1181677">remove docker-runc and docker-proxy packages plus unneeded -kubic flavours</issue>
  <issue tracker="bnc" id="959405">add audit rules for docker daemon</issue>
  <issue tracker="bnc" id="1115464">Out of date package: openSUSE:Factory/docker is out of date</issue>
  <issue tracker="bnc" id="1089732">Virtualization:containers/docker: SLES_12: Docker not running due to missing apparmor profile</issue>
  <issue tracker="bnc" id="1066801">VUL-0: CVE-2017-16539: docker: The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through17.03.2-ce does not block /proc/scsi pathnames, which allows attackers totrigger data loss (when certain older Linux kernels are used) b</issue>
  <issue tracker="bnc" id="942370">update docker to 1.8.1</issue>
  <issue tracker="bnc" id="1214108">VUL-0: CVE-2023-28841: docker,golang-github-docker-libnetwork: Encrypted overlay network traffic may be unencrypted</issue>
  <issue tracker="bnc" id="970637">update docker to 1.10.3</issue>
  <issue tracker="bnc" id="1138920">EMU: old configs in daemon.json were removed</issue>
  <issue tracker="bnc" id="909710">VUL-0: CVE-2014-9357: docker: Escalation of privileges during decompression of LZMA archives</issue>
  <issue tracker="bnc" id="1213500">[trackerbug] docker 24.0.4-ce update</issue>
  <issue tracker="bnc" id="995058">[TRACKERBUG] update docker to 1.12.0 (and runc and containerd)</issue>
  <issue tracker="bnc" id="909712">VUL-0: CVE-2014-9356: docker: Path traversal during processing of absolute symlinks</issue>
  <issue tracker="bnc" id="1250508">Remove git-core as a dependency for docker</issue>
  <issue tracker="bnc" id="978260">Docker 1.11 requires runC and containerd binaries be called docker-*</issue>
  <issue tracker="bnc" id="1084533">3rd party registries used the default Docker certificate instead of the one specified for the registry</issue>
  <issue tracker="bnc" id="1019251">Docker 1.12.5 -- Docker commands are failing -- Error: Cannot connect to the Docker daemon.</issue>
  <issue tracker="bnc" id="1047218">trackerbug: packages do not build reproducibly from including build time</issue>
  <issue tracker="bnc" id="1211578">[trackerbug] docker 23.0.6-ce update</issue>
  <issue tracker="bnc" id="1176708">[trackerbug] Docker 19.03.13 update</issue>
  <issue tracker="bnc" id="956434">Upgrade to docker 1.9.1</issue>
  <issue tracker="bnc" id="1066210">VUL-0: CVE-2017-14992: docker: Lack of content verification allows a remote attacker to cause DoS via crafted tar archive</issue>
  <issue tracker="bnc" id="1001161">Docker: "--hostname" - set hostname and domainname separately</issue>
  <issue tracker="bnc" id="1191121">VUL-0: CVE-2021-41103: containerd: file access to local users</issue>
  <issue tracker="bnc" id="1172377">VUL-0: CVE-2020-13401: docker: [trackerbug] Docker 19.03.11 update</issue>
  <issue tracker="bnc" id="1121768">VUL-0: CVE-2018-20699: docker: denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value</issue>
  <issue tracker="bnc" id="1142160">VUL-0: CVE-2019-13509: docker: In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario</issue>
  <issue tracker="bnc" id="1139649">[trackerbug] Docker 18.09.7 update</issue>
  <issue tracker="bnc" id="950931">Unable to build docker on SLES 12 SP1 PPC64LE from SRC RPM</issue>
  <issue tracker="bnc" id="999582">VMware snapshots not working with running docker containers inside the VM</issue>
  <issue tracker="bnc" id="987198">Docker installs kernel-xen dependency on KVM</issue>
  <issue tracker="bnc" id="1100727">Can't run docker on SLE15 ppc64le: error while loading shared libraries: R_PPC64_ADDR16_HA re10d830328 for symbol `' out of range</issue>
  <issue tracker="bnc" id="1182476">Docker wrong SemVer version string</issue>
  <issue tracker="bnc" id="1170446">VUL-0: CVE-2020-8695: ucode-intel: Intel RAPL sidechannel (SGX part)</issue>
  <issue tracker="bnc" id="996015">[TRACKERBUG] update docker to 1.12.1</issue>
  <issue tracker="bnc" id="954797">SLES12 SP1 - Deleting a docker container not possible, after the container start fails</issue>
  <issue tracker="bnc" id="1112980">'ulimit: open files: cannot modify limit: Operation not permitted' when using cri-o</issue>
  <issue tracker="bnc" id="1219438">VUL-0: CVE-2024-23653: buildkit: BuildKit API doesn't validate entitlement on container creation</issue>
  <issue tracker="bnc" id="908033">docker-registry needs to be included in sle 12 tech preview of docker</issue>
  <issue tracker="bnc" id="907012">VUL-0: CVE-2014-6407: docker: symbolic and hardlink issues leading to privilege escalation</issue>
  <issue tracker="bnc" id="1217513">VUL-0: docker: mitigate power-based side channel attacks (advisory GHSA-jq35-85cj-fj4p)</issue>
  <issue tracker="bnc" id="1004490">update docker to 1.12.2</issue>
  <issue tracker="bnc" id="1086185">Kubelet: reserve compute resources for system daemons</issue>
  <issue tracker="bnc" id="1181594">[trackerbug] Docker 20.10.2 update</issue>
  <issue tracker="bnc" id="1219267">VUL-0: CVE-2024-23651: docker: race condition in mount</issue>
  <issue tracker="bnc" id="1108038">docker hard-requires git-core</issue>
  <issue tracker="bnc" id="1175081">Docker on btrfs disables quotas globally</issue>
  <issue tracker="bnc" id="1119634">go: multi-version installation is broken on version switch</issue>
  <issue tracker="bnc" id="1134068">docker: update to 18.09.5</issue>
  <issue tracker="bnc" id="983015">The cgroup changes after docker-1.5.0-23.1 increases latency when running containers on SLES12</issue>
  <issue tracker="bnc" id="1074971">[TRACKERBUG] Enabling mirroring of private  registries with docker</issue>
  <issue tracker="bnc" id="1192814">[trackerbug] docker 20.10.11-ce update</issue>
  <issue tracker="bnc" id="954812">Please update Docker to 1.9 (as of today)</issue>
  <issue tracker="bnc" id="1038493">Feature: Allow installing multiple go compiler versions</issue>
  <issue tracker="bnc" id="1184768">[trackerbug] Docker 20.10.6 update</issue>
  <issue tracker="bnc" id="1046024">Docker networking broken after boot</issue>
  <issue tracker="bnc" id="1181641">After docker update, containerd-shim-runc-v2 cannot find "runc" binary</issue>
  <issue tracker="bnc" id="1015661">New patch breaks existing docker containers</issue>
  <issue tracker="bnc" id="1030702">docker fails to start containers: error creating secret</issue>
  <issue tracker="bnc" id="1142413">[trackerbug] Docker 19.03.0 update</issue>
  <issue tracker="bnc" id="1105000">harmonise docker and docker-kubic packaging</issue>
  <issue tracker="bnc" id="988707">SLES 12 SP2 Beta3 - iptable option "-iptable=false" in docker configuration needs to be removed</issue>
  <issue tracker="bnc" id="1210141">docker.socket systemd configurations dosn't exist</issue>
  <issue tracker="bnc" id="1205375">VUL-0: CVE-2022-36109: docker: supplementary group permissions bypass</issue>
  <issue tracker="bnc" id="1240150">rootless docker fails on SLES</issue>
  <issue tracker="bnc" id="964468">gcc-go can no longer compile Docker (master)</issue>
  <issue tracker="bnc" id="1102522">Docker v18.06-ce upgrade.</issue>
  <issue tracker="bnc" id="1247362">[EAR - NOT FOR USA Citizens] docker-stable: Merged files not be released after docker export</issue>
  <issue tracker="bnc" id="1191334">VUL-0: CVE-2021-41092: docker: exposed user credentials with a misconfigured configuration file</issue>
  <issue tracker="bnc" id="1012568">VUL-0: CVE-2016-9962: runc: container escape vulnerability</issue>
  <issue tracker="bnc" id="1037436">docker exec -i leaks exec IDs</issue>
  <issue tracker="bnc" id="1073877">Docker fails to stop container</issue>
  <issue tracker="bnc" id="963142">SLES 12 SP1 - Copy one or more  file to docker container via "docker cp" causes an error when removing the container later on</issue>
  <issue tracker="bnc" id="1183855">When stopping docker btrfs quotas are removed</issue>
  <issue tracker="bnc" id="1208074">[trackerbug] docker 23.0.0-ce update</issue>
  <issue tracker="bnc" id="1124308">docker: update to 18.09.1</issue>
  <issue tracker="bnc" id="984942">audit.rules in docker-1.9.1-58.1.x86_64.rpm has a syntax error</issue>
  <issue tracker="bnc" id="1213229">VUL-0: CVE-2023-29406: go1.19,go1.20: net/http: insufficient sanitization of Host header</issue>
  <issue tracker="bnc" id="1028639">docker: conditional filtering not supported on libseccomp for leap42.1</issue>
  <issue tracker="bnc" id="1028638">docker: conditional filtering not supported on libseccomp for sle12 or sle12sp1</issue>
  <issue tracker="bnc" id="913211">Docker: cannot use devicemapper driver when e2fsprogs is not installed</issue>
  <issue tracker="bnc" id="909709">VUL-0: CVE-2014-9358: docker: Path traversal and spoofing opportunities presented through image identifiers</issue>
  <issue tracker="bnc" id="1128376">CaasP 3.0 worker nodes went into the NotReady State because the PLEG healthcheck</issue>
  <issue tracker="bnc" id="1016307">update docker to 1.12.5</issue>
  <issue tracker="bnc" id="1072798">docker requires obsolete bridge-utils</issue>
  <issue tracker="bnc" id="1200145">VUL-0: CVE-2022-31030: containerd: denial of service via invocation of the ExecSync API</issue>
  <issue tracker="bnc" id="1181730">VUL-0: CVE-2021-21285: docker: pulling a malformed Docker image manifest crashes the dockerd daemon</issue>
  <issue tracker="bnc" id="1037607">The image from April 28th is broken: docker fails to run containers</issue>
  <issue tracker="bnc" id="1122469">nginx blocked by apparmor?</issue>
  <issue tracker="bnc" id="1182947">[trackerbug] Docker 20.10.5 update</issue>
  <issue tracker="bnc" id="930235">VUL-0: CVE-2015-3630, CVE-2015-3631, CVE-2015-3627,CVE-2015-3629: docker: various security issues</issue>
  <issue tracker="bnc" id="1085117">man pages for individual docker CLI commands missing</issue>
  <issue tracker="bnc" id="1118897">VUL-0: CVE-2018-16873: go: cmd/go: remote command execution</issue>
  <issue tracker="bnc" id="1064781">docker version returns "unknown-version" for client</issue>
  <issue tracker="bnc" id="1029630">docker does not wait for lvm on system startup</issue>
  <issue tracker="bnc" id="968933">update docker to 1.10.2</issue>
  <issue tracker="bnc" id="1118990">L3-Question: Docker 18.06-ce can not commit images with &gt;23GB files</issue>
  <issue tracker="bnc" id="1215323">[trackerbug] docker 24.0.6-ce update</issue>
  <issue tracker="bnc" id="913213">Docker:   issues with api bind/volumesfrom on start</issue>
  <issue tracker="bnc" id="1121412">should disable to building kubic multibuilded subpackage on Leap</issue>
  <issue tracker="bnc" id="1178801">[Build 20201113] firewalld: failure in docker_compose</issue>
  <issue tracker="bnc" id="946653">update docker to 1.8.2</issue>
  <issue tracker="bnc" id="1190670">[Build 20210917][glibc2.34] docker blocks clone3 syscall</issue>
  <issue tracker="bnc" id="1034063">Containers cannot resolve DNS if docker host uses 127.0.0.1 as resolver</issue>
  <issue tracker="bnc" id="1007249">VUL-0: CVE-2016-8867: docker: Fix ambient capability usage in containers</issue>
  <issue tracker="bnc" id="995102">Docker "migrator" prevents installing "docker", if it was not installed before</issue>
  <issue tracker="bnc" id="935570">Upgrade to docker 1.7.0</issue>
  <issue tracker="bnc" id="1181732">VUL-1: CVE-2021-21284: docker: potential privilege escalation when the root user in the remapped namespace has access to the host filesystem</issue>
  <issue tracker="bnc" id="1059011">Docker service fails to come up after hard reboot of machine with error 'failed to cleanup ipc mounts'</issue>
  <issue tracker="bnc" id="993847">Pin component dependencies for Docker &gt;= 1.11.0</issue>
  <issue tracker="bnc" id="1212368">[trackerbug] docker 24.0.2-ce update</issue>
  <issue tracker="bnc" id="1180401">[Build 20201228-1] Failed to program NAT chain: INVALID_ZONE: docker</issue>
  <issue tracker="bnc" id="1113313">need SLE12 containers module docker update to 18.06.1-ce as soon as possible</issue>
  <issue tracker="bnc" id="1021227">Docker devicemapper support for deferred removal/deletion</issue>
  <issue tracker="bnc" id="1214107">VUL-0: CVE-2023-28840: golang-github-docker-libnetwork,docker: Encrypted overlay network may be unauthenticated</issue>
  <issue tracker="bnc" id="1069468">Packages should no longer use /var/adm/fillup-templates</issue>
  <issue tracker="bnc" id="988408">update to gcc6-go for ppc64le/s390x</issue>
  <issue tracker="bnc" id="977394">update go to 1.6</issue>
  <issue tracker="bnc" id="1069758">Update Docker to 17.09.1_ce</issue>
  <issue tracker="bnc" id="995620">docker-proxy missing from docker 1.12.x package</issue>
  <issue tracker="bnc" id="1038476">"zypper in docker" fails with "docker: command not found"</issue>
  <issue tracker="bnc" id="1048046">docker binaries incorrectly built, contain TEXTRELS</issue>
  <issue tracker="bnc" id="1214109">VUL-0: CVE-2023-28842: docker,golang-github-docker-libnetwork: Encrypted overlay network with a single endpoint is unauthenticated</issue>
  <issue tracker="bnc" id="1180243">[trackerbug] Docker 19.03.14 update</issue>
  <issue tracker="bnc" id="1016992">Virtualization:containers/docker: Bug</issue>
  <issue tracker="bnc" id="1213120">[trackerbug] docker 24.0.3-ce update</issue>
  <issue tracker="bnc" id="1057743">Docker Dead after upgrade from 1.12.6 to 17.04.0-ce</issue>
  <issue tracker="bnc" id="1058173">Build docker on SUSE:SLE-12-SP2:Update</issue>
  <issue tracker="bnc" id="974208">libbtrfs-devel 4.5.1 breaks Docker build</issue>
  <issue tracker="bnc" id="1009961">docker runc requirement calls for a runc downgrade</issue>
  <issue tracker="bnc" id="1157330">Docker containers become partially unresponsive</issue>
  <issue tracker="bnc" id="1250596">docker-stable changelog does not reference old CVEs</issue>
  <issue tracker="bnc" id="1193273">VUL-1: CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion</issue>
  <issue tracker="bnc" id="968972">let docker manage the cgroups of the processes that it launches without systemd</issue>
  <issue tracker="bnc" id="907014">VUL-0: CVE-2014-6408: docker: potential container escalation</issue>
  <issue tracker="bnc" id="1114832">Running supportconfig on any node can take lots of resources, even fill the hard disk on big/long-running clusters</issue>
  <issue tracker="bnc" id="1219268">VUL-0: CVE-2024-23652: docker: arbitrary deletion of files</issue>
  <issue tracker="bnc" id="1118898">VUL-0: CVE-2018-16874: go: cmd/go: directory traversal</issue>
  <issue tracker="cve" id="2024-23651"/>
  <issue tracker="cve" id="2020-12912"/>
  <issue tracker="cve" id="2023-28842"/>
  <issue tracker="cve" id="2023-28840"/>
  <issue tracker="cve" id="2016-3697"/>
  <issue tracker="cve" id="2014-8179"/>
  <issue tracker="cve" id="2021-41092"/>
  <issue tracker="cve" id="2017-14992"/>
  <issue tracker="cve" id="2021-41190"/>
  <issue tracker="cve" id="2019-14271"/>
  <issue tracker="cve" id="2021-41091"/>
  <issue tracker="cve" id="2021-43565"/>
  <issue tracker="cve" id="2015-3629"/>
  <issue tracker="cve" id="2024-23652"/>
  <issue tracker="cve" id="2021-41103"/>
  <issue tracker="cve" id="2021-21284"/>
  <issue tracker="cve" id="2019-13509"/>
  <issue tracker="cve" id="2018-10892"/>
  <issue tracker="cve" id="2020-8694"/>
  <issue tracker="cve" id="2018-15664"/>
  <issue tracker="cve" id="2015-3631"/>
  <issue tracker="cve" id="2020-15257"/>
  <issue tracker="cve" id="2022-36109"/>
  <issue tracker="cve" id="2024-41110"/>
  <issue tracker="cve" id="2016-9962"/>
  <issue tracker="cve" id="2018-16873"/>
  <issue tracker="cve" id="2022-24769"/>
  <issue tracker="cve" id="2025-22868"/>
  <issue tracker="cve" id="2025-22869"/>
  <issue tracker="cve" id="2024-23653"/>
  <issue tracker="cve" id="2015-3630"/>
  <issue tracker="cve" id="2014-9357"/>
  <issue tracker="cve" id="2014-9358"/>
  <issue tracker="cve" id="2014-3499"/>
  <issue tracker="cve" id="2017-16539"/>
  <issue tracker="cve" id="2014-9356"/>
  <issue tracker="cve" id="2023-28841"/>
  <issue tracker="cve" id="2021-21285"/>
  <issue tracker="cve" id="2021-41089"/>
  <issue tracker="cve" id="2020-13401"/>
  <issue tracker="cve" id="2020-8695"/>
  <issue tracker="cve" id="2018-16875"/>
  <issue tracker="cve" id="2014-6407"/>
  <issue tracker="cve" id="2014-8178"/>
  <issue tracker="cve" id="2014-6408"/>
  <issue tracker="cve" id="2024-29018"/>
  <issue tracker="cve" id="2022-27191"/>
  <issue tracker="cve" id="2015-3627"/>
  <issue tracker="cve" id="2014-5277"/>
  <issue tracker="cve" id="2024-2365"/>
  <issue tracker="cve" id="2018-16874"/>
  <issue tracker="cve" id="2018-20699"/>
  <issue tracker="cve" id="2016-8867"/>
  <issue tracker="jsc" id="SLE-16460"/>
  <issue tracker="fate" id="325877"/>
  <issue tracker="fate" id="324652"/>
  <packager>cyphar</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for docker-stable</summary>
  <description>This update for docker-stable fixes the following issues:

Note this update contains a already fixed references mostly.

- Remove git-core recommends on SLE to avoid pulling it in unnecessary. (bsc#1250508)

  This feature is mostly intended for developers ("docker build git://") so
  most users already have the dependency installed, and the error when git is
  missing is fairly straightforward (so they can easily figure out what they
  need to install).

- Include historical changelog data from before the docker-stable fork. The
  initial changelog entry did technically provide all the necessary
  information, but our CVE tracking tools do not understand how the package is
  forked and so it seems that this package does not include fixes for ~12 years
  of updates. So, include a copy of the original package's changelog up until
  the fork point. bsc#1250596

- Update to docker-buildx v0.25.0. Upstream changelog:
  &lt;https://github.com/docker/buildx/releases/tag/v0.25.0&gt;

- Update to Go 1.23 for building now that upstream has switched their 23.0.x
  LTSS to use Go 1.23.

- Do not try to inject SUSEConnect secrets when in Rootless Docker mode, as
  Docker does not have permission to access the host zypper credentials in this
  mode (and unprivileged users cannot disable the feature using
  /etc/docker/suse-secrets-enable.) bsc#1240150

- Initial docker-stable fork, forked from Docker 24.0.7-ce release
  (packaged on 2024-02-14). The original changelog is included below for
  historical reference.
</description>
</patchinfo>
openSUSE Build Service is sponsored by