ubuntu

ubuntu exploit最新发现

小樊
39
2025-09-27 02:38:20
栏目: 智能运维

Ubuntu Latest Exploits (2025)

1. Linux libblockdev + PAM Chain Exploit (CVE-2025-6018/CVE-2025-6019)

Description: A high-severity local privilege escalation chain affecting Ubuntu (alongside Debian, Fedora, and SUSE). CVE-2025-6018 is a PAM configuration flaw that grants “allow_active” status (normally reserved for local console users) to remote SSH sessions. CVE-2025-6019 exploits libblockdev (via udisks2) to execute root-level operations once “allow_active” is obtained.
Impact: Remote attackers with a low-privilege SSH account can chain these vulnerabilities to gain root access to the system, enabling full control over the server.
Affected Versions:

2. Apport Core Dump Information Disclosure (CVE-2025-5054)

Description: A medium-severity vulnerability in Ubuntu’s default core dump handler (Apport). It allows local attackers with user namespace creation permissions to leak sensitive data (e.g., password hashes) from SUID process core dumps by exploiting a race condition.
Impact: Attackers can extract confidential information (e.g., /etc/shadow hashes) from crashed SUID programs, which could lead to further privilege escalation.
Affected Versions:

3. Sudo Path Resolution Vulnerability (CVE-2025-32463)

Description: A critical local privilege escalation in Sudo (1.9.14–1.9.17) caused by incorrect path resolution order. Attackers can force Sudo to load malicious libraries (e.g., libnss_xxx.so) from a crafted directory, bypassing security checks and gaining root access without being in the sudoers file.
Impact: Local non-privileged users can escalate to root, compromising the entire system.
Affected Versions:

General Recommendations for Ubuntu Users

These exploits highlight the importance of proactive vulnerability management—especially for default services like Apport, udisks2, and Sudo—which are common targets for attackers due to their widespread use.

0
看了该问题的人还看了