{"affected":[{"ecosystem_specific":{"binaries":[{"containerd":"1.2.13-5.22.2","docker":"19.03.11_ce-6.34.2","docker-bash-completion":"19.03.11_ce-6.34.2","docker-libnetwork":"0.7.0.1+gitr2902_153d0769a118-4.21.2","docker-runc":"1.0.0rc10+gitr3981_dc9208a3303f-6.38.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP1","name":"containerd","purl":"pkg:rpm/suse/containerd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.2.13-5.22.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.13-5.22.2","docker":"19.03.11_ce-6.34.2","docker-bash-completion":"19.03.11_ce-6.34.2","docker-libnetwork":"0.7.0.1+gitr2902_153d0769a118-4.21.2","docker-runc":"1.0.0rc10+gitr3981_dc9208a3303f-6.38.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP1","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"19.03.11_ce-6.34.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.13-5.22.2","docker":"19.03.11_ce-6.34.2","docker-bash-completion":"19.03.11_ce-6.34.2","docker-libnetwork":"0.7.0.1+gitr2902_153d0769a118-4.21.2","docker-runc":"1.0.0rc10+gitr3981_dc9208a3303f-6.38.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP1","name":"docker-runc","purl":"pkg:rpm/suse/docker-runc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.0.0rc10+gitr3981_dc9208a3303f-6.38.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"1.2.13-5.22.2","docker":"19.03.11_ce-6.34.2","docker-bash-completion":"19.03.11_ce-6.34.2","docker-libnetwork":"0.7.0.1+gitr2902_153d0769a118-4.21.2","docker-runc":"1.0.0rc10+gitr3981_dc9208a3303f-6.38.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 15 SP1","name":"golang-github-docker-libnetwork","purl":"pkg:rpm/suse/golang-github-docker-libnetwork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.7.0.1+gitr2902_153d0769a118-4.21.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:\n\nDocker was updated to 19.03.11-ce\nrunc was updated to version 1.0.0-rc10\ncontainerd was updated to version 1.2.13\n\n- CVE-2020-13401: Fixed an issue where an attacker with CAP_NET_RAW capability, could have crafted IPv6 router \n  advertisements, and spoof external IPv6 hosts, resulting in obtaining  sensitive information or causing  denial \n  of service (bsc#1172377).\n","id":"SUSE-SU-2020:1657-1","modified":"2020-06-18T08:49:58Z","published":"2020-06-18T08:49:58Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20201657-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1172377"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13401"}],"related":["CVE-2020-13401"],"summary":"Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork","upstream":["CVE-2020-13401"]}