{"affected":[{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"containerd","purl":"pkg:rpm/suse/containerd&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.2.5+gitr639_422e31c-20.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.04.0_ce-98.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"golang-github-docker-libnetwork","purl":"pkg:rpm/suse/golang-github-docker-libnetwork&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.0.0+git20170119.7b2b1fe-4.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 6","name":"runc","purl":"pkg:rpm/suse/runc&distro=SUSE%20OpenStack%20Cloud%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.1.1+gitr2947_9c2d8d1-20.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-distribution-registry":"2.6.1-15.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"containerd","purl":"pkg:rpm/suse/containerd&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.2.5+gitr639_422e31c-20.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-distribution-registry":"2.6.1-15.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"docker","purl":"pkg:rpm/suse/docker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"17.04.0_ce-98.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-distribution-registry":"2.6.1-15.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"docker-distribution","purl":"pkg:rpm/suse/docker-distribution&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.6.1-15.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-distribution-registry":"2.6.1-15.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"golang-github-docker-libnetwork","purl":"pkg:rpm/suse/golang-github-docker-libnetwork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.0.0+git20170119.7b2b1fe-4.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"containerd":"0.2.5+gitr639_422e31c-20.2","docker":"17.04.0_ce-98.2","docker-distribution-registry":"2.6.1-15.2","docker-libnetwork":"0.0.0+git20170119.7b2b1fe-4.1","runc":"0.1.1+gitr2947_9c2d8d1-20.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Containers 12","name":"runc","purl":"pkg:rpm/suse/runc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Containers%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.1.1+gitr2947_9c2d8d1-20.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for Containerd, Docker and RunC provides several fixes and enhancements.\n\nContainerd:\n\n- Update containerd to the version needed for docker-v17.04.0-ce. (bsc#1034053) \n- Fix spurious messages filling journal. (bsc#1032769)\n- Set TasksMax=infinity to make sure runC doesn't start failing randomly.\n\nDocker:\n\n- Update to version 17.04.0-ce. (bsc#1034053)\n- Fix execids leaks due to bad error handling. (bsc#1037436)\n- Make Apparmor's pkg/aaparser work on read-only root. (bsc#1037607)\n- Improve Docker's systemd configuration. (bsc#1032287)\n- Check if the docker binary is available before attempting to use it. (bsc#1038476)\n- Build man pages for all architectures. (bsc#953182)\n- Fix DNS resolution when Docker host uses 127.0.0.1 as resolver. (bsc#1034063)\n- Enable Delegate=yes, since systemd will safely ignore lvalues it doesn't understand.\n- Update SUSE secrets patch to handle bsc#1030702.\n- Change lvm2 from Requires to Recommends: Docker usually uses a default storage driver,\n  when it's not configured explicitly. This default driver then depends on the underlying\n  system and gets chosen during installation. (bsc#1032644)\n- Disable libseccomp for Leap 42.1, SLE 12 and 12-SP1, because docker needs a higher version.\n  Otherwise, we get the error 'conditional filtering requires libseccomp version >= 2.2.1.\n  (bsc#1028639, bsc#1028638)\n- Add a backport of fix to AppArmor lazy loading docker-exec case.\n- Fix systemd TasksMax default which could throttle docker. (bsc#1026827)\n- Enable pkcs11\n\nFor a comprehensive list of changes please refer to /usr/share/doc/packages/docker/CHANGELOG.md\n\nRunC:\n\n- Update version to the one required by docker-17.04.0-ce. (bsc#1034053) \n- Make sure to ignore cgroup v2 mountpoints. (bsc#1028113)\n","id":"SUSE-RU-2017:1965-1","modified":"2017-07-12T13:49:18Z","published":"2017-07-12T13:49:18Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement//suse-ru-20171965-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1026827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1028113"},{"type":"REPORT","url":"https://bugzilla.suse.com/1028638"},{"type":"REPORT","url":"https://bugzilla.suse.com/1028639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1030702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1032287"},{"type":"REPORT","url":"https://bugzilla.suse.com/1032644"},{"type":"REPORT","url":"https://bugzilla.suse.com/1032769"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1037436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1037607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1038476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1038493"},{"type":"REPORT","url":"https://bugzilla.suse.com/1040618"},{"type":"REPORT","url":"https://bugzilla.suse.com/953182"},{"type":"REPORT","url":"https://bugzilla.suse.com/964546"},{"type":"REPORT","url":"https://bugzilla.suse.com/996303"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-8932"}],"related":["CVE-2017-8932"],"summary":"Recommended update for Docker, RunC, Containerd","upstream":["CVE-2017-8932"]}