[pkg-go] Bug#927981: golang-github-seccomp-libseccomp-golang: CVE-2017-18367
Salvatore Bonaccorso
carnil at debian.org
Thu Apr 25 22:10:11 BST 2019
Source: golang-github-seccomp-libseccomp-golang
Version: 0.9.0-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/seccomp/libseccomp-golang/issues/22
Hi,
The following vulnerability was published for golang-github-seccomp-libseccomp-golang.
CVE-2017-18367[0]:
| libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR
| multiple arguments rather than ANDing them. A process running under a
| restrictive seccomp filter that specified multiple syscall arguments
| could bypass intended access restrictions by specifying a single
| matching argument.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-18367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18367
[1] https://github.com/seccomp/libseccomp-golang/issues/22
[2] https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
[3] http://www.openwall.com/lists/oss-security/2019/04/25/6
Regards,
Salvatore
More information about the Pkg-go-maintainers
mailing list