CVE-2017-18367

EUVD-2021-0954
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
Affected Products (NVD)
VendorProductVersion
libseccomp-golang_projectlibseccomp-golang
𝑥
≤ 0.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
golang-github-seccomp-libseccomp-golang
bookworm
0.10.0-3
fixed
bullseye
0.9.1-2
fixed
sid
0.10.0-3
fixed
trixie
0.10.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-github-seccomp-libseccomp-golang
bionic
needed
cosmic
ignored
disco
ignored
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
not-affected
noble
not-affected
trusty
dne
xenial
Fixed 0.0~git20150813.0.1b506fc-2+deb9u1build0.16.04.1
released