CVE-2025-5054

4.7 MEDIUM

📋 TL;DR

A race condition vulnerability in Canonical's apport crash reporting tool allows local attackers to leak sensitive information from core dumps. By exploiting PID reuse in container environments, attackers can trick apport into forwarding crash data to containers where it can be accessed. This affects Ubuntu systems with apport versions up to 2.32.0.

💻 Affected Systems

Products:
  • Canonical apport
Versions: Up to and including 2.32.0
Operating Systems: Ubuntu Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires apport enabled and container environments (namespaces) to be present on the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive memory contents from privileged processes could be leaked to containerized attackers, potentially exposing credentials, encryption keys, or other confidential data.

🟠

Likely Case

Local attackers with container access could obtain limited sensitive information from processes that crash and are quickly replaced.

🟢

If Mitigated

With proper patching, only unprivileged process crashes or those with kernel-provided pidfds are forwarded to containers, significantly reducing information leakage risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to create/manipulate containers. The race condition window is narrow but exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.32.1 and later

Vendor Advisory: https://ubuntu.com/security/notices/USN-7545-1

Restart Required: No

Instructions:

1. Update apport package: sudo apt update && sudo apt install apport
2. Verify version: dpkg -l apport | grep ^ii
3. Ensure version is 2.32.1 or higher

🔧 Temporary Workarounds

Disable apport crash reporting

linux

Completely disable apport to prevent crash handling and information leakage

sudo systemctl stop apport
sudo systemctl disable apport
echo "enabled=0" | sudo tee /etc/default/apport

Restrict container creation

linux

Limit ability to create containers to reduce attack surface

sudo chmod 750 /usr/bin/docker
sudo chmod 750 /usr/bin/podman
sudo usermod -aG docker trusted_users_only

🧯 If You Can't Patch

  • Disable apport service entirely to prevent crash handling
  • Implement strict access controls to prevent unauthorized users from creating containers

🔍 How to Verify

Check if Vulnerable:

Check apport version: dpkg -l apport | grep ^ii | awk '{print $3}'

Check Version:

dpkg -l apport | grep ^ii | awk '{print $3}'

Verify Fix Applied:

Verify apport version is 2.32.1 or higher: dpkg -l apport | grep ^ii

📡 Detection & Monitoring

Log Indicators:

  • Unusual apport crash reports from containerized processes
  • Multiple rapid crash reports for same PID
  • Apport logs showing container forwarding errors

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="apport" AND ("container" OR "namespace") AND event_type="crash_report"

🔗 References

📤 Share & Export