libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
https://usn.ubuntu.com/4574-1/
https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html
https://github.com/seccomp/libseccomp-golang/issues/22
https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
https://access.redhat.com/errata/RHSA-2019:4090