CVE-2017-18367

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libseccomp-golang_project:libseccomp-golang:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:19

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/04/25/6 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/04/25/6 - Mailing List, Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:4087 - () https://access.redhat.com/errata/RHSA-2019:4087 -
References () https://access.redhat.com/errata/RHSA-2019:4090 - () https://access.redhat.com/errata/RHSA-2019:4090 -
References () https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e - Patch, Third Party Advisory () https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e - Patch, Third Party Advisory
References () https://github.com/seccomp/libseccomp-golang/issues/22 - Patch, Third Party Advisory () https://github.com/seccomp/libseccomp-golang/issues/22 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html - () https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html -
References () https://usn.ubuntu.com/4574-1/ - () https://usn.ubuntu.com/4574-1/ -

Information

Published : 2019-04-24 21:29

Updated : 2024-11-21 03:19


NVD link : CVE-2017-18367

Mitre link : CVE-2017-18367

CVE.ORG link : CVE-2017-18367


JSON object : View

Products Affected

libseccomp-golang_project

  • libseccomp-golang
CWE
CWE-20

Improper Input Validation