vulnerability
SUSE: CVE-2017-16539: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Nov 4, 2017 | Feb 9, 2018 | Feb 4, 2022 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Nov 4, 2017
Added
Feb 9, 2018
Modified
Feb 4, 2022
Description
The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
Solution(s)
suse-upgrade-containerdsuse-upgrade-dockersuse-upgrade-docker-bash-completionsuse-upgrade-docker-fish-completionsuse-upgrade-docker-libnetworksuse-upgrade-docker-runc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.