CVE-2025-5054
Race Condition in Canonical Apport
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).
Qualys discovered that Apport incorrectly handled metadata when processing application crashes. An attacker could possibly use this issue to leak sensitive information.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-05-21 CVE Reserved
- 2025-05-30 CVE Published
- 2025-05-30 CVE Updated
- 2025-05-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
- CAPEC-26: Leveraging Race Conditions
References (3)
URL | Tag | Source |
---|---|---|
https://ubuntu.com/security/CVE-2025-5054 | Vdb Entry |
|
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://ubuntu.com/security/notices/USN-7545-1 | 2025-05-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Apport Search vendor "Canonical" for product "Apport" | >= 2.20.0 <= 2.32.0 Search vendor "Canonical" for product "Apport" and version " >= 2.20.0 <= 2.32.0" | en |
Affected
|