{"id":"CVE-2017-18367","details":"libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.","aliases":["GHSA-58v3-j75h-xr49","GO-2020-0007"],"modified":"2026-05-14T12:51:58.592220Z","published":"2019-04-24T21:29:00.243Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html"},{"type":"WEB","url":"https://usn.ubuntu.com/4574-1/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4087"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4090"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2019/04/25/6"},{"type":"FIX","url":"https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e"},{"type":"FIX","url":"https://github.com/seccomp/libseccomp-golang/issues/22"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/seccomp/libseccomp-golang","events":[{"introduced":"0"},{"last_affected":"e3496e3a417d1dc9ecdceca5af2513271fed37a0"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:libseccomp-golang_project:libseccomp-golang:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.9.0"}]}}],"versions":["v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-18367.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}