Security Flaw in Linux Kernel Affects Docker Implementations
CVE-2025-21834
Summary
A vulnerability in the Linux kernel impacts Docker environments by failing to properly filter the uretprobe system call within seccomp. When users attach uretprobes to processes in Docker, these processes may experience segmentation faults due to the default seccomp filters blocking an essential system call that is a kernel implementation detail. As it is designed solely for kernel operations and not intended for use by user-space applications, it is impractical to require applications to allow this call explicitly. The vulnerability underscores the necessity of revising seccomp filters to accommodate this system call without configuration dependency, ensuring stable operation of tracked processes.
Affected Version(s)
Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c < 5a262628f4cf2437d863fe41f9d427177b87664c
Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c
Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c
References
Timeline
Vulnerability published
Vulnerability Reserved