Access Control Bypass Affecting github.com/seccomp/libseccomp-golang package, versions <0.9.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMSECCOMPLIBSECCOMPGOLANG-174520
  • published25 Apr 2019
  • disclosed24 Apr 2019
  • creditAn Xiao

Introduced: 24 Apr 2019

CVE-2017-18367  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade github.com/seccomp/libseccomp-golang to version 0.9.1 or higher.

Overview

Affected versions of this package are vulnerable to Access Control Bypass. Earlier versions of libseccomp-golang incorrectly generates BPFs using OR boolean logic instead of AND. Due to this flaw, a process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument. Multiple syscall argument rules should be matched with AND logic.

CVSS Scores

version 3.1