Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-18367

Опубликовано: 24 апр. 2019
Источник: debian

Описание

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-seccomp-libseccomp-golangfixed0.9.0-2package

Примечания

  • https://github.com/seccomp/libseccomp-golang/issues/22

  • https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

CVSS3: 6.5
redhat
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

CVSS3: 7.5
nvd
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

CVSS3: 4.8
github
больше 4 лет назад

Improper Input Validation in libseccomp-golang

CVSS3: 7.5
fstec
почти 7 лет назад

Уязвимость программного обеспечения libseccomp-golang, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных