20.6 C
New York
Tuesday, July 22, 2025

Apport local information disclosure vulnerability fixes available


Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu core dump handler (CVE-2025-5054), and systemd-coredump, the core dump handler in Red Hat Enterprise Linux, Fedora and other Linux distributions (CVE-2025-4598). CVE-2025-4598 does not affect Ubuntu releases.

The vulnerabilities have a CVSS score of 4.7 (MEDIUM), requiring local access and high attack complexity. The impact is restricted to the confidentiality of the memory space of invoked suid executables. The exploit demonstrated by Qualys can leak hashed user passwords and, as such, has limited real-world impact.

Canonical’s security team has released updates for the apport package for all affected Ubuntu releases. This package is installed by default in all Ubuntu Server images and Ubuntu Desktop installations. The update remediates CVE-2025-5054. Information on the affected versions can be found in the CVE page linked above. If you have any of these installed, our recommendation is to update as soon as possible.

Qualys discovered that, when analyzing application crashes, apport attempts to detect if the crashing process was running inside a container before performing consistency checks on it. This means that if a local attacker manages to induce a crash in a privileged process and quickly replaces it with another one with the same process ID that resides inside a mount and pid namespace, apport will attempt to forward the core dump (which might contain sensitive information belonging to the original, privileged process) into the namespace.

In order to successfully carry out the exploit, an attacker must have permissions to create user, mount and pid namespaces with full capabilities.

Release Package Name Fixed Version
Xenial (16.04) apport 2.20.1-0ubuntu2.30+esm5
Bionic (18.04) apport 2.20.9-0ubuntu7.29+esm1
Focal (20.04) apport 2.20.11-0ubuntu27.28
Jammy (22.04) apport 2.20.11-0ubuntu82.7
Noble (24.04) apport 2.28.1-0ubuntu3.6
Oracular (24.10) apport 2.30.0-0ubuntu4.3
Plucky (25.04) apport 2.32.0-0ubuntu5.1

On your system, run the following command and compare the listed version to the table above.

apt list --installed | grep "^apport"

We recommend you upgrade all packages:

sudo apt update && sudo apt upgrade

If this is not possible, the affected component can be targeted:

# on focal and newer:

sudo apt update && sudo apt install --only-upgrade apport python3-apport

# on xenial and bionic:

sudo apt update && sudo apt install --only-upgrade apport python3-apport python-apport

The unattended-upgrades feature is enabled by default for Ubuntu 16.04 LTS onwards. This service:  

  • Applies new security updates every 24 hours automatically.
  • If you have this enabled, the patches above will be automatically applied within 24 hours of being available.

The strongest protection is to apply the security updates. The following mitigations have also been explored. If security updates cannot be applied, you should only apply the following steps as a last resort and revert the configuration once updates are applied.

The ability to obtain core dumps of suid executable processes can be completely disabled by setting the fs.suid_dumpable sysctl to 0. While this completely neutralizes the vulnerability, it also restricts the ability to investigate crashes for all processes which change privileges upon execution..

echo "fs.suid_dumpable = 0" | sudo tee /etc/sysctl.d/10-cve-2025-5054.conf

sudo sysctl -p /etc/sysctl.d/10-cve-2025-5054.conf

We would like to thank Qualys for their excellent reporting and for inviting the Ubuntu Security Team to coordinate this issue.

https://www.qualys.com/apport-systemd-info-disclosure-vulnerabilities-discovered-by-qualys-tru

https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt

https://ubuntu.com/security/notices/USN-7545-1

https://ubuntu.com/security/CVE-2025-5054

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

0FansLike
0FollowersFollow
0FollowersFollow
0SubscribersSubscribe
- Advertisement -spot_img

CATEGORIES & TAGS

- Advertisement -spot_img

LATEST COMMENTS

Most Popular