Your submission was sent successfully! Close

USN-4574-1: libseccomp-golang vulnerability

7 October 2020

A system hardening measure could be bypassed.

Releases

Packages

Details

It was discovered that libseccomp-golang did not properly generate BPFs. If
a process were running under a restrictive seccomp filter that specified
multiple syscall arguments, the application could potentially bypass the
intended restrictions put in place by seccomp.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04

After a standard system update anything that depends on libseccomp-golang needs
to be rebuilt to make all the necessary changes.

References