The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
{ "binaries": [ { "binary_name": "docker-doc", "binary_version": "18.06.1-0ubuntu1~16.04.2" }, { "binary_name": "docker.io", "binary_version": "18.06.1-0ubuntu1~16.04.2" }, { "binary_name": "golang-docker-dev", "binary_version": "18.06.1-0ubuntu1~16.04.2" }, { "binary_name": "golang-github-docker-docker-dev", "binary_version": "18.06.1-0ubuntu1~16.04.2" }, { "binary_name": "vim-syntax-docker", "binary_version": "18.06.1-0ubuntu1~16.04.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "docker-doc", "binary_version": "18.06.1-0ubuntu1~18.04.1" }, { "binary_name": "docker.io", "binary_version": "18.06.1-0ubuntu1~18.04.1" }, { "binary_name": "golang-docker-dev", "binary_version": "18.06.1-0ubuntu1~18.04.1" }, { "binary_name": "golang-github-docker-docker-dev", "binary_version": "18.06.1-0ubuntu1~18.04.1" }, { "binary_name": "vim-syntax-docker", "binary_version": "18.06.1-0ubuntu1~18.04.1" } ], "availability": "No subscription required" }