Jump to content
  • Ubuntu's apport affected by core dump vulnerability, here's how to patch


    Karlston

    • 235 views
    • 3 minutes
     Share


    • 235 views
    • 3 minutes

    When programs crash on Linux, they usually create a core dump containing the program’s memory at crash time to help developers resolve problems. This is crucial for developers so they can address bugs, but right now, the program responsible for creating core dumps in Ubuntu and Ubuntu-based distributions like AnduinOS, are also vulnerable to a new exploit.

     

    The bug has been tagged with the CVE number CVE-2025-5054 and has a CVSS score of 4.7 (MEDIUM). This bug is inherently harder to exploit because it requires local access to the victim’s computer. Furthermore, Qualys, which discovered the fault, showed off a demo where it was able to leak hashed user passwords. While this isn’t great, the real-world impact is limited.

    How the vulnerability works

    Qualys found that when apport analyzes application crashes, it has a look if the process was running inside a container before performing consistency checks on it. If an attacker can manage to crash a program within a privileged process and quickly replaces it with the same process ID and residing in both a mount and PID namespace, they can get apport to forward the core dump to them via the namespace. The core dump may contain sensitive information from the privileged process.

     

    Aside from the attacker only being able to perform this locally, they must also have significant permissions to carry out the attack, limiting the damage that the issue can cause.

    What to do about it

    Thankfully, Canonical’s security team has already published updates for apport to fix this issue on all affected Ubuntu releases, including Ubuntu Desktop and Ubuntu Server. If you have unattended upgrades switched on, you may already be patched, but if you’re not sure, just check for and apply the latest updates with this command:

     

    sudo apt update && sudo apt upgrade

     

    If you can’t apply all available updates for whatever reason, then you can run these commands to just update apport:

     

    Ubuntu 20.04 and newer:

     

    sudo apt update && sudo apt install --only-upgrade apport python3-apport

     

    Ubuntu 16.04 and Ubuntu 18.04:

     

    sudo apt update && sudo apt install --only-upgrade apport python3-apport python-apport

    Do you need to rush to install this update?

    Given the limited impact of this vulnerability, you’re likely to be fine if you don’t patch right away. With that said, it only takes a couple of minutes to perform the update and it’s good for peace of mind. You may also have more critical updates ready to install to that you haven’t noticed so updating promptly is recommended to catch those too.

     

    Source


    Hope you enjoyed this news post.

    Thank you for appreciating my time and effort posting news every day for many years.

    News posts... 2023: 5,800+ | 2024: 5,700+ | 2025 (till end of May): 2,377

    RIP Matrix | Farewell my friend  


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...