Source: docker.io
Version: 1.13.1~ds2-3
Severity: grave
Tags: patch security upstream
Forwarded: https://github.com/moby/moby/pull/35399

Hi,

The following vulnerability was published for docker.io.

CVE-2017-16539[0]:
| The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through
| 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers
| to trigger data loss (when certain older Linux kernels are used) by
| leveraging Docker container access to write a "scsi
| remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.

There is upstream issue in [1] and the fixed slightly changes for us
for the version in unstable. Red Hat has fixed the issue fuer their
docker-1.12.1 and docker-1.13.1, cf. [2].

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-16539
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16539
[1] https://github.com/moby/moby/pull/35399
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1516205
[3] 
https://github.com/moby/moby/pull/35399/commits/a21ecdf3c8a343a7c94e4c4d01b178c87ca7aaa1

Regards,
Salvatore

Reply via email to