Skip to content

Improper Input Validation in libseccomp-golang

High severity GitHub Reviewed Published May 18, 2021 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

gomod github.com/seccomp/libseccomp-golang (Go)

Affected versions

< 0.9.1

Patched versions

0.9.1

Description

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

References

Reviewed May 17, 2021
Published to the GitHub Advisory Database May 18, 2021
Last updated Jan 9, 2023

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(65th percentile)

Weaknesses

CVE ID

CVE-2017-18367

GHSA ID

GHSA-58v3-j75h-xr49

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.