Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-18367

Опубликовано: 24 апр. 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

Отчет

This issue may affect OpenShift Container Platform 3.x and 4.x if you are providing a custom Seccomp profile using Security Context Constraints [1]. The custom Seccomp profile would need to specify multiple arguments, such as below, from [2]. { "names": [ "socketcall" ], "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "value": 1, "valueTwo": 0, "op": "SCMP_CMP_EQ" }, { "index": 1, "value": 1, "valueTwo": 0, "op": "SCMP_CMP_EQ" } ], "comment": "", "includes": {}, "excludes": {} }, If such a profile was used the arguments could be combined as an OR rule, not AND, as the user might expect from Seccomp. [1] https://docs.openshift.com/container-platform/4.1/authentication/managing-security-context-constraints.html [2] https://github.com/moby/moby/issues/32714#issuecomment-295532163

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10atomic-openshiftWill not fix
Red Hat OpenShift Container Platform 4openshift-enterprise-node-containerAffected
Red Hat OpenShift Container Platform 3.11atomic-openshiftFixedRHSA-2020:247918.06.2020
Red Hat OpenShift Container Platform 4.1openshiftFixedRHSA-2019:408717.12.2019
Red Hat OpenShift Container Platform 4.1openshift4/ose-cliFixedRHSA-2019:409017.12.2019
Red Hat OpenShift Container Platform 4.1openshift4/ose-cli-artifactsFixedRHSA-2019:409017.12.2019
Red Hat OpenShift Container Platform 4.1openshift4/ose-hyperkubeFixedRHSA-2019:409017.12.2019
Red Hat OpenShift Container Platform 4.1openshift4/ose-hypershiftFixedRHSA-2019:409017.12.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1706826libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions

EPSS

Процентиль: 64%
0.00465
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

CVSS3: 7.5
nvd
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.

CVSS3: 7.5
debian
почти 7 лет назад

libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR ...

CVSS3: 4.8
github
больше 4 лет назад

Improper Input Validation in libseccomp-golang

CVSS3: 7.5
fstec
почти 7 лет назад

Уязвимость программного обеспечения libseccomp-golang, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 64%
0.00465
Низкий

6.5 Medium

CVSS3