CVE-2025-5054
Linux Ubuntu vulnerability analysis and mitigation

Overview

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. The vulnerability occurs when handling a crash, where the function _check_global_pid_and_forward, which detects if the crashing process resided in a container, was being called before consistency_checks, which attempts to detect if the crashing process had been replaced (NVD, Ubuntu Security).

Technical details

The vulnerability exists due to incorrect ordering of security checks in apport's crash handling process. When a crash occurs, apport performs container detection before process consistency verification, creating a race condition. An attacker can exploit this by crashing a SUID program, quickly killing it, and replacing it with a containerized process before apport's analysis. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.7 (Medium) with vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Qualys Report).

Impact

The vulnerability allows attackers to access sensitive information from crashed SUID programs' memory, including password hashes from /etc/shadow. The impact is particularly significant when exploiting programs like unix_chkpwd, which handles password verification and loads sensitive authentication data into memory (Hacker News, Qualys Report).

Mitigation and workarounds

The vulnerability has been patched by reordering the security checks, ensuring consistency_checks is called before _check_global_pid_and_forward. Additionally, crashes are now only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged. As a temporary mitigation, systems can set /proc/sys/fs/suid_dumpable to 0, which prevents SUID programs from being analyzed during crashes (Ubuntu Security, Qualys Report).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management