CVE-2025-21834Linux vulnerability

15 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 6
Latest updateApr 1

Description

In the Linux kernel, the following vulnerability has been resolved: seccomp: passthrough uretprobe systemcall without filtering When attaching uretprobes to processes running inside docker, the attached process is segfaulted when encountering the retprobe. The reason is that now that uretprobe is a system call the default seccomp filters in docker block it as they only allow a specific set of known syscalls. This is true for other userspace applications which use seccomp to control their sysc

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.116.12.14+2
Debianlinux/linux_kernel< 6.12.15-1+1
CVEListV5linux/linuxff474a78cef5cb5f32be52fe25b78441327a2e7c5a262628f4cf2437d863fe41f9d427177b87664c+3
debiandebian/linux< linux 6.12.15-1 (forky)

Patches

🔴Vulnerability Details

7
OSV
linux-raspi vulnerabilities2025-04-01
OSV
linux, linux-aws, linux-azure, linux-gcp, linux-hwe-6.11, linux-oracle, linux-realtime vulnerabilities2025-03-27
OSV
linux-oem-6.11 vulnerabilities2025-03-27
OSV
linux-lowlatency vulnerabilities2025-03-27
OSV
linux-lowlatency-hwe-6.11 vulnerabilities2025-03-27

📋Vendor Advisories

7
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-04-01
Ubuntu
Linux kernel (Low Latency) vulnerabilities2025-03-27
Ubuntu
Linux kernel (Low Latency) vulnerabilities2025-03-27
Ubuntu
Linux kernel vulnerabilities2025-03-27
Ubuntu
Linux kernel (OEM) vulnerabilities2025-03-27
CVE-2025-21834 — Linux vulnerability | cvebase