Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8dd367da-4111-44d2-bda3-a9c53d7f6e8b@vdwaa.nl>
Date: Mon, 2 Jun 2025 14:33:30 +0200
From: Jelle van der Waa <jelle@...aa.nl>
To: oss-security@...ts.openwall.com
Subject: Re: Local information disclosure in apport and
 systemd-coredump

On 29/05/2025 19:17, Qualys Security Advisory wrote:
> 
> Qualys Security Advisory
> 
> Local information disclosure in apport and systemd-coredump
> (CVE-2025-5054 and CVE-2025-4598)
<snip>
> 
> The fix for these vulnerabilities is twofold:
> 
> - always take account of the kernel's per-process "dumpable" flag (the
>    %d specifier), in every code path, to decide whether a non-root user
>    should be given read access to a core dump or not;
> 
> - use the new %F specifier in /proc/sys/kernel/core_pattern (a pidfd to
>    the crashed process), which was implemented during this coordinated
>    vulnerability disclosure, to detect whether the crashed process was
>    replaced or not with another process, before its analysis; for more
>    information:
> 
>    https://lore.kernel.org/all/20250414-work-coredump-v2-0-685bf231f828@kernel.org/
Christian Brauner has backported fixes for this issue to all stable 
kernel series. Quoting his mastodon post:

 > I have done custom backports of the patches to install a pidfd into 
the legacy usermodehelper coredump handler for v6.12, v6.6, v6.1, v5.14, 
v5.10, and v5.4.

LKML post:

https://lore.kernel.org/linux-fsdevel/20250602-eilte-experiment-4334f67dc5d8@brauner/T/#m03e7e205c913101dc452c391bf283661049ca494

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.