~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-16539

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-16539
2
 
PublicDate: 2017-11-04
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16539
5
 
 https://twitter.com/ewindisch/status/926443521820774401
6
 
Description:
7
 
 The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through
8
 
 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to
9
 
 trigger data loss (when certain older Linux kernels are used) by leveraging
10
 
 Docker container access to write a "scsi remove-single-device" line to
11
 
 /proc/scsi/scsi, aka SCSI MICDROP.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
Bugs:
15
 
Priority: medium
16
 
Discovered-by:
17
 
Assigned-to:
18
 
 
19
 
 
20
 
Patches_docker.io:
21
 
 upstream: https://github.com/moby/moby/pull/35399/commits/a21ecdf3c8a343a7c94e4c4d01b178c87ca7aaa1
22
 
upstream_docker.io: needed
23
 
precise/esm_docker.io: DNE
24
 
trusty_docker.io: needs-triage
25
 
xenial_docker.io: needs-triage
26
 
zesty_docker.io: ignored (reached end-of-life)
27
 
artful_docker.io: needs-triage
28
 
bionic_docker.io: needs-triage
29
 
devel_docker.io: needs-triage