fkie_cve-2025-5054
Vulnerability from fkie_nvd
Published
2025-05-30 18:15
Modified
2025-08-22 19:36
Severity ?
Summary
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.
When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).
References
▼ | URL | Tags | |
---|---|---|---|
security@ubuntu.com | https://ubuntu.com/security/CVE-2025-5054 | Third Party Advisory | |
security@ubuntu.com | https://ubuntu.com/security/notices/USN-7545-1 | Third Party Advisory | |
security@ubuntu.com | https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt | Exploit, Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | apport | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 20.04 | |
canonical | ubuntu_linux | 22.04 | |
canonical | ubuntu_linux | 24.04 | |
canonical | ubuntu_linux | 24.10 | |
canonical | ubuntu_linux | 25.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2661E14-5C57-45A4-98B9-3ACBECBD57B9", "versionEndIncluding": "2.32.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*", "matchCriteriaId": "BF90B5A4-6E55-4369-B9D4-E7A061E797D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*", "matchCriteriaId": "DE07EF30-B50E-4054-9918-50EFA416073B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:*:*:*:*", "matchCriteriaId": "E1AE2209-6CBC-4189-89ED-DA0FF100D77D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces.\n\n\n\n\nWhen handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1)." }, { "lang": "es", "value": "La condici\u00f3n de ejecuci\u00f3n en Canonical Apport (hasta la versi\u00f3n 2.32.0 incluida) permite a un atacante local filtrar informaci\u00f3n confidencial mediante la reutilizaci\u00f3n de PID aprovechando los espacios de nombres. Al gestionar un fallo, la funci\u00f3n `_check_global_pid_and_forward`, que detecta si el proceso causante del fallo reside en un contenedor, se invocaba antes que `consistency_checks`, que intenta detectar si el proceso causante del fallo ha sido reemplazado. Por ello, si un proceso falla y se reemplaza r\u00e1pidamente por uno contenedorizado, se pod\u00eda ejecutar `apport` para reenviar el volcado de memoria al contenedor, lo que podr\u00eda filtrar informaci\u00f3n confidencial. `consistency_checks` ahora se invoca antes que `_check_global_pid_and_forward`. Adem\u00e1s, dado que la condici\u00f3n de ejecuci\u00f3n de reutilizaci\u00f3n de PID no se puede detectar de forma fiable solo desde el espacio de usuario, los fallos solo se reenv\u00edan a los contenedores si el n\u00facleo proporcion\u00f3 un pidfd o si el proceso causante del fallo no ten\u00eda privilegios (es decir, si el modo de volcado es 1)." } ], "id": "CVE-2025-5054", "lastModified": "2025-08-22T19:36:15.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "security@ubuntu.com", "type": "Secondary" } ] }, "published": "2025-05-30T18:15:32.670", "references": [ { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/CVE-2025-5054" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://ubuntu.com/security/notices/USN-7545-1" }, { "source": "security@ubuntu.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "security@ubuntu.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…