Bug 1706826 (CVE-2017-18367)
Summary: | CVE-2017-18367 libseccomp-golang: mishandling of multiple argument rules leading to a bypass of intended access restrictions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ahardin, aos-bugs, bleanhar, bmontgom, ccoleman, dedgar, eparis, go-sig, jburrell, jchaloup, jgoulding, jokerman, maszulik, mchappel, mfojtik, nstielau, sponnaga, sttts |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libseccomp-golang 0.9.1 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-12-17 08:09:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1706828, 1706829, 1728130, 1728131, 1779016, 1779017, 1779018, 1779019, 1779020 | ||
Bug Blocks: | 1706830 |
Description
Marian Rehak
2019-05-06 11:11:22 UTC
Created golang-github-seccomp-libseccomp-golang tracking bugs for this issue: Affects: epel-6 [bug 1706829] Affects: fedora-all [bug 1706828] This issue affects This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4087 https://access.redhat.com/errata/RHSA-2019:4087 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:4090 https://access.redhat.com/errata/RHSA-2019:4090 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18367 Statement: This issue may affect OpenShift Container Platform 3.x and 4.x if you are providing a custom Seccomp profile using Security Context Constraints [1]. The custom Seccomp profile would need to specify multiple arguments, such as below, from [2]. { "names": [ "socketcall" ], "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "value": 1, "valueTwo": 0, "op": "SCMP_CMP_EQ" }, { "index": 1, "value": 1, "valueTwo": 0, "op": "SCMP_CMP_EQ" } ], "comment": "", "includes": {}, "excludes": {} }, If such a profile was used the arguments could be combined as an OR rule, not AND, as the user might expect from Seccomp. [1] https://docs.openshift.com/container-platform/4.1/authentication/managing-security-context-constraints.html [2] https://github.com/moby/moby/issues/32714#issuecomment-295532163 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:2479 https://access.redhat.com/errata/RHSA-2020:2479 |