Security Flaw in Linux Kernel Affects Docker Implementations
CVE-2025-21834

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
6 March 2025

Summary

A vulnerability in the Linux kernel impacts Docker environments by failing to properly filter the uretprobe system call within seccomp. When users attach uretprobes to processes in Docker, these processes may experience segmentation faults due to the default seccomp filters blocking an essential system call that is a kernel implementation detail. As it is designed solely for kernel operations and not intended for use by user-space applications, it is impractical to require applications to allow this call explicitly. The vulnerability underscores the necessity of revising seccomp filters to accommodate this system call without configuration dependency, ensuring stable operation of tracked processes.

Affected Version(s)

Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c < 5a262628f4cf2437d863fe41f9d427177b87664c

Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c

Linux ff474a78cef5cb5f32be52fe25b78441327a2e7c

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.