{"affected":[{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6-LTSS","name":"containerd","purl":"pkg:rpm/suse/containerd&distro=SUSE%20OpenStack%20Cloud%206-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.2.2-16.14.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6-LTSS","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20OpenStack%20Cloud%206-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"18.09.1_ce-98.34.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6-LTSS","name":"docker-runc","purl":"pkg:rpm/suse/docker-runc&distro=SUSE%20OpenStack%20Cloud%206-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6-LTSS","name":"golang-github-docker-libnetwork","purl":"pkg:rpm/suse/golang-github-docker-libnetwork&distro=SUSE%20OpenStack%20Cloud%206-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"containerd","purl":"pkg:rpm/suse/containerd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.2.2-16.14.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"18.09.1_ce-98.34.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"docker-runc","purl":"pkg:rpm/suse/docker-runc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.2-16.14.2","docker":"18.09.1_ce-98.34.2","docker-libnetwork":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2","docker-runc":"1.0.0rc6+gitr3748_96ec2177ae84-1.17.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"golang-github-docker-libnetwork","purl":"pkg:rpm/suse/golang-github-docker-libnetwork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.7.0.1+gitr2711_2cfbf9b1f981-16.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-16875: Fixed a CPU Denial of Service (bsc#1118899).\n- CVE-2018-16874: Fixed a vulnerabity in go get command which could allow directory traversal in GOPATH mode (bsc#1118898).\n- CVE-2018-16873: Fixed a vulnerability in go get command which could allow remote code execution when executed with -u in GOPATH mode (bsc#1118897).\n- CVE-2019-5736: Effectively copying /proc/self/exe during re-exec to avoid write attacks to the host runc binary, which could lead to a container\n  breakout (bsc#1121967).\n\nOther changes and bug fixes:\n\n- Update shell completion to use Group: System/Shells.\n- Add daemon.json file with rotation logs configuration (bsc#1114832)\n- Update to Docker 18.09.1-ce (bsc#1124308) and to to runc 96ec2177ae84.\n  See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.\n- Disable leap based builds for kubic flavor (bsc#1121412).\n- Allow users to explicitly specify the NIS domain name of a container (bsc#1001161).\n- Update docker.service to match upstream and avoid rlimit problems (bsc#1112980).\n- Update go requirements to >= go1.10 \n- Use -buildmode=pie for tests and binary build (bsc#1048046 and bsc#1051429).\n- Remove the usage of 'cp -r' to reduce noise in the build logs.\n","id":"SUSE-SU-2019:0573-1","modified":"2019-03-08T12:49:44Z","published":"2019-03-08T12:49:44Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2019/suse-su-20190573-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1001161"},{"type":"REPORT","url":"https://bugzilla.suse.com/1048046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1112980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114832"},{"type":"REPORT","url":"https://bugzilla.suse.com/1118897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1118898"},{"type":"REPORT","url":"https://bugzilla.suse.com/1118899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121412"},{"type":"REPORT","url":"https://bugzilla.suse.com/1121967"},{"type":"REPORT","url":"https://bugzilla.suse.com/1124308"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-9962"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16873"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5736"}],"related":["CVE-2016-9962","CVE-2018-16873","CVE-2018-16874","CVE-2018-16875","CVE-2019-5736"],"summary":"Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc","upstream":["CVE-2016-9962","CVE-2018-16873","CVE-2018-16874","CVE-2018-16875","CVE-2019-5736"]}