CVE-2025-5054

MEDIUM

Canonical apport <2.32.0 - Info Disclosure

Title source: llm

Description

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

Exploits (1)

nomisec SCANNER 2 stars
by daryllundy · poc
https://github.com/daryllundy/cve-2025-5054

Scores

CVSS v3 4.7
EPSS 0.0003
EPSS Percentile 8.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-362
Status published
Products (8)
canonical/apport < 2.32.0
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 22.04
canonical/ubuntu_linux 24.04
canonical/ubuntu_linux 24.10
canonical/ubuntu_linux 25.04
Published May 30, 2025
Tracked Since Feb 18, 2026