CVE-2025-21834
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/03/2025
Last modified:
29/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
seccomp: passthrough uretprobe systemcall without filtering<br />
<br />
When attaching uretprobes to processes running inside docker, the attached<br />
process is segfaulted when encountering the retprobe.<br />
<br />
The reason is that now that uretprobe is a system call the default seccomp<br />
filters in docker block it as they only allow a specific set of known<br />
syscalls. This is true for other userspace applications which use seccomp<br />
to control their syscall surface.<br />
<br />
Since uretprobe is a "kernel implementation detail" system call which is<br />
not used by userspace application code directly, it is impractical and<br />
there&#39;s very little point in forcing all userspace applications to<br />
explicitly allow it in order to avoid crashing tracked processes.<br />
<br />
Pass this systemcall through seccomp without depending on configuration.<br />
<br />
Note: uretprobe is currently only x86_64 and isn&#39;t expected to ever be<br />
supported in i386.<br />
<br />
[kees: minimized changes for easier backporting, tweaked commit log]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.12.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



