libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
References
Link | Resource |
---|---|
https://github.com/seccomp/libseccomp-golang/issues/22 | Patch Third Party Advisory |
https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2019/04/25/6 | Mailing List Patch Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:4087 | |
https://access.redhat.com/errata/RHSA-2019:4090 | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html | |
https://usn.ubuntu.com/4574-1/ |
Configurations
Information
Published : 2019-04-24 14:29
Updated : 2020-10-14 15:15
NVD link : CVE-2017-18367
Mitre link : CVE-2017-18367
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
libseccomp-golang_project
- libseccomp-golang