Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: moby/profiles
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: seccomp/v0.2.1
Choose a base ref
...
head repository: moby/profiles
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: seccomp/v0.2.2
Choose a head ref
  • 2 commits
  • 2 files changed
  • 2 contributors

Commits on Apr 30, 2026

  1. seccomp: Block socketcall to prevent AF_ALG filter bypass

    The socket arg filters that block AF_ALG and AF_VSOCK only apply to the
    direct socket(2) syscall. On architectures with the legacy socketcall(2)
    multiplexer (i386, s390, MIPS o32), libseccomp auto-generates a
    socketcall(SYS_SOCKET) -> ALLOW companion for each socket ALLOW rule.
    This companion only checks the socketcall sub-command number, not the
    address family (behind a pointer BPF cannot dereference), bypassing the
    AF_ALG block for 32-bit binaries.
    
    Add an explicit socketcall -> ERRNO(ENOSYS) deny rule placed before the
    socket allow rules. ENOSYS must be used instead of EPERM because the
    deny errno must differ from DefaultErrnoRet (EPERM): runc skips calling
    seccomp_rule_add() entirely when a rule's action matches the default
    action, so an EPERM deny is never passed to libseccomp and the
    auto-generated socketcall ALLOW path survives unchallenged. With ENOSYS,
    runc passes the rule through, and libseccomp replaces the auto-generated
    ALLOW path with ERRNO(ENOSYS) in the BPF.
    
    Since Linux 4.3, all affected architectures provide direct socket
    syscalls and modern glibc/musl already use them. Only very old
    statically-linked 32-bit binaries compiled against pre-4.3 glibc would
    be affected.
    
    Co-authored-by: Tianon Gravi <[email protected]>
    Signed-off-by: Paweł Gronowski <[email protected]>
    vvoland and tianon committed Apr 30, 2026
    Configuration menu
    Copy the full SHA
    7158007 View commit details
    Browse the repository at this point in the history

Commits on May 1, 2026

  1. Merge pull request #21 from vvoland/fix-socketcall

    seccomp: Explicitly block socketcall to prevent AF_ALG filter bypass
    vvoland authored May 1, 2026
    Configuration menu
    Copy the full SHA
    d62da27 View commit details
    Browse the repository at this point in the history
Loading