Search CVE reports
1 – 2 of 2 results
libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
1 affected package
libseccomp
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libseccomp | — | — | — | Fixed |
Some fixes available 1 of 4
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass...
1 affected package
golang-github-seccomp-libseccomp-golang
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
golang-github-seccomp-libseccomp-golang | Not affected | Not affected | Not affected | Vulnerable |