{"id":"CVE-2017-18367","details":"libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.","aliases":["GHSA-58v3-j75h-xr49","GO-2020-0007"],"modified":"2026-03-15T22:24:09.697900Z","published":"2019-04-24T21:29:00.243Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html"},{"type":"WEB","url":"https://usn.ubuntu.com/4574-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4087"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4090"},{"type":"FIX","url":"https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e"},{"type":"FIX","url":"https://github.com/seccomp/libseccomp-golang/issues/22"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2019/04/25/6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/seccomp/libseccomp-golang","events":[{"introduced":"0"},{"last_affected":"e3496e3a417d1dc9ecdceca5af2513271fed37a0"},{"fixed":"06e7a29f36a34b8cf419aeb87b979ee508e58f9e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.0"}]}}],"versions":["v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-18367.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}