First published: Thu May 30 2019(Updated: )
Jann Horn discovered that libseccomp did not correctly generate 64-bit syscall argument comparisons with arithmetic operators (LT, GT, LE, GE). An attacker could use this to bypass intended access restrictions for argument-filtered system calls.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libseccomp2 | <2.4.1-0ubuntu0.19.04.3 | 2.4.1-0ubuntu0.19.04.3 |
Ubuntu Ubuntu | =19.04 | |
All of | ||
ubuntu/libseccomp2 | <2.4.1-0ubuntu0.18.10.3 | 2.4.1-0ubuntu0.18.10.3 |
Ubuntu Ubuntu | =18.10 | |
All of | ||
ubuntu/libseccomp2 | <2.4.1-0ubuntu0.18.04.2 | 2.4.1-0ubuntu0.18.04.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libseccomp2 | <2.4.1-0ubuntu0.16.04.2 | 2.4.1-0ubuntu0.16.04.2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.