libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
www.openwall.com/lists/oss-security/2019/04/25/6
access.redhat.com/errata/RHSA-2019:4087
access.redhat.com/errata/RHSA-2019:4090
github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
github.com/seccomp/libseccomp-golang/issues/22
lists.debian.org/debian-lts-announce/2020/08/msg00016.html
usn.ubuntu.com/4574-1/