Seguridad: divulgación de información local en Apport y Systemd -Coredump

Summary of Qualys Security Advisory on Local Information Disclosure Vulnerabilities

Overview

Qualys has identified two vulnerabilities in core-dump handlers used in Linux distributions, specifically apport in Ubuntu and systemd-coredump in Red Hat Enterprise Linux and Fedora. These vulnerabilities (CVE-2025-5054 and CVE-2025-4598) enable local attackers to exploit race conditions to gain unauthorized access to sensitive information from core dumps created when setuid programs crash.

Context and Significance

Both vulnerabilities stem from race conditions where an attacker can quickly replace a crashed SUID program with a non-SUID program before the core dump handler processes the crashed program’s files. Successful exploitation can lead to unauthorized access to the /etc/shadow file, which contains hashed passwords, or sensitive data from root daemons.

Vulnerabilities in Detail

  1. Apport (CVE-2025-5054):

    • Mechanism: An attacker could forcibly crash a SUID program (e.g., unix_chkpwd) while simultaneously replacing it with a different process before apport analyzes its state.
    • Security Analysis: While apport has implemented several safeguards over the years, it still has weaknesses. The checks that ensure the integrity of the crashed process are executed after the core dump has started, allowing for exploitation.
    • Proof of Concept: A crafted attack can successfully retrieve password hashes from the unix_chkpwd program’s memory by timing the process replacements correctly.
  2. Systemd-coredump (CVE-2025-4598):
    • Mechanism: Similar to the first vulnerability, but more straightforward as it does not require the replaced process to be namespaced. A non-SUID process can replace the crashed one, allowing the attacker to read the core dump.
    • Security Analysis: Systemd’s protections against these races are inadequate, presenting an easier attack surface compared to apport. The vulnerability’s exploitation is complicated by systemd-coredump’s C implementation, which reduces available time for the attack.
    • Proof of Concept: Through a crafted input, it can reveal sensitive information from unix_chkpwd using the systemd core dump process.

Mitigation Strategies

To mitigate these vulnerabilities, the advisory suggests setting /proc/sys/fs/suid_dumpable to 0 to entirely prevent core dumps from being created for SUID and SGID programs, effectively serving as a temporary solution until proper patches are applied. Further technical fixes include making sure that core dump handlers respect the kernel’s per-process "dumpable" flag to ensure that unprivileged users cannot access core dumps from privileged processes.

Acknowledgments and Collaboration

The advisory credits the hard work of the Ubuntu security team, developers of apport, developers of systemd, and Red Hat Product Security for their cooperation in addressing these vulnerabilities. Additionally, kernel feature %F is highlighted as an enhancement that could bolster protections against such attacks in the future.

Timeline of Events

  • Initial advisories and proofs of concept were communicated to affected developers from March to early May 2025, culminating in a public advisory release on May 29, 2025. This collaborative approach underscores the importance of open source community communication in enhancing software security.

Overall, these vulnerabilities pose significant risks for Linux distributions, particularly concerning the handling of sensitive data in crash situations, underlining the need for ongoing vigilance and robust security practices among developers.

Enlace de la fuente, haz clic para tener más información

Artículos y alertas de seguridad

Consultar más contenidos y alertas

Alertas y noticias de seguridad de la información

Contacta

Contacta con nosotros para obtener soluciones integrales en IT y seguridad de la información

Estamos encantados de responder cualquier pregunta que puedas tener, y ayudarte a determinar cuáles de nuestros servicios se adaptan mejor a tus necesidades.

Nuestros beneficios:
¿Qué sucede a continuación?
1

Programamos una llamada según tu conveniencia.

2

Realizamos una reunión de descubrimiento y consultoría.

3

Preparamos una propuesta.

Agenda una consulta gratuita