The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
{
"binaries": [
{
"binary_name": "docker.io",
"binary_version": "18.06.1-0ubuntu1~16.04.2"
},
{
"binary_name": "golang-docker-dev",
"binary_version": "18.06.1-0ubuntu1~16.04.2"
},
{
"binary_name": "golang-github-docker-docker-dev",
"binary_version": "18.06.1-0ubuntu1~16.04.2"
},
{
"binary_name": "vim-syntax-docker",
"binary_version": "18.06.1-0ubuntu1~16.04.2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "docker.io",
"binary_version": "18.06.1-0ubuntu1~18.04.1"
},
{
"binary_name": "golang-docker-dev",
"binary_version": "18.06.1-0ubuntu1~18.04.1"
},
{
"binary_name": "golang-github-docker-docker-dev",
"binary_version": "18.06.1-0ubuntu1~18.04.1"
},
{
"binary_name": "vim-syntax-docker",
"binary_version": "18.06.1-0ubuntu1~18.04.1"
}
],
"availability": "No subscription required"
}