Security update for docker

This update for containerd, docker, docker-runc and golang-github-docker-libnetwork fixes the following issues:

Security issues fixed for containerd, docker, docker-runc and golang-github-docker-libnetwork:

- CVE-2018-16873: cmd/go: remote command execution during "go get -u" (bsc#1118897)
- CVE-2018-16874: cmd/go: directory traversal in "go get" via curly braces in import paths (bsc#1118898)
- CVE-2018-16875: crypto/x509: CPU denial of service (bsc#1118899)

Non-security issues fixed for docker:

- Disable leap based builds for kubic flavor (bsc#1121412)
- Allow users to explicitly specify the NIS domainname of a container (bsc#1001161)
- Update docker.service to match upstream and avoid rlimit problems (bsc#1112980)
- Allow docker images larger then 23GB (bsc#1118990)
- Docker version update to version 18.09.0-ce (bsc#1115464)

This update was imported from the SUSE:SLE-15:Update update project.

Message

Updating docker will restart the docker service, which may stop some of your docker containers. Do you want to proceed with the update?

Fixed bugs
bnc#1118899
VUL-0: CVE-2018-16875: go: crypto/x509: CPU denial of service
bnc#1118898
VUL-0: CVE-2018-16874: go: cmd/go: directory traversal
bnc#1118897
VUL-0: CVE-2018-16873: go: cmd/go: remote command execution
bnc#1121412
should disable to building kubic multibuilded subpackage on Leap
bnc#1118990
L3-Question: Docker 18.06-ce can not commit images with >23GB files
bnc#1112980
'ulimit: open files: cannot modify limit: Operation not permitted' when using cri-o
bnc#1001161
Docker: "--hostname" - set hostname and domainname separately
bnc#1115464
Out of date package: openSUSE:Factory/docker is out of date
Selected Binaries
openSUSE Build Service is sponsored by