USN-4574-1: libseccomp-golang vulnerability
7 October 2020
A system hardening measure could be bypassed.
- golang-github-seccomp-libseccomp-golang - a Go-based interface to the libseccomp library
It was discovered that libseccomp-golang did not properly generate BPFs. If
a process were running under a restrictive seccomp filter that specified
multiple syscall arguments, the application could potentially bypass the
intended restrictions put in place by seccomp.
The problem can be corrected by updating your system to the following package versions:
After a standard system update anything that depends on libseccomp-golang needs
to be rebuilt to make all the necessary changes.