New Linux Vulnerabilities
Linux系统中的两个竞态条件漏洞(CVE-2025-5054和CVE-2025-4598)可能被本地攻击者利用,通过诱导特权进程崩溃并替换为具有相同PID的进程,在Apport或systemd-coredump处理核心转储时获取敏感信息。该漏洞为中等严重性,需修复。 2025-6-3 11:7:32 Author: www.schneier.com(查看原文) 阅读量:23 收藏

They’re interesting:

Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems.

[…]

“This means that if a local attacker manages to induce a crash in a privileged process and quickly replaces it with another one with the same process ID that resides inside a mount and pid namespace, apport will attempt to forward the core dump (which might contain sensitive information belonging to the original, privileged process) into the namespace.”

Moderate severity, but definitely worth fixing.

Slashdot thread.

Tags: , ,

Posted on June 3, 2025 at 7:07 AM0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.


文章来源: https://www.schneier.com/blog/archives/2025/06/new-linux-vulnerabilities.html
如有侵权请联系:admin#unsafe.sh