First published: Sat Nov 04 2017(Updated: )
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mobyproject Moby | <=17.03.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2017-16539.
The severity of CVE-2017-16539 is medium with a CVSS score of 5.9.
CVE-2017-16539 affects Docker Moby versions up to and including 17.03.2-ce.
An attacker can exploit CVE-2017-16539 by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi, which can lead to data loss in certain older Linux kernels.
Yes, there is a fix available for CVE-2017-16539. Users should upgrade to a fixed version of Docker Moby.