systemd-252-55.el9_7.7.ML.1
エラータID: AXSA:2025-11553:11
リリース日:
2025/12/18 Thursday - 16:39
題名:
systemd-252-55.el9_7.7.ML.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- systemd-coredump には、SUID プロセスの強制的なクラッシュの発生
を許容してしまう問題があるため、ローカルの攻撃者により、不正な
コアダンプファイルへのアクセスとこれによる機密情報の漏洩を可能と
する脆弱性が存在します。(CVE-2025-4598)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-4598
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
追加情報:
N/A
ダウンロード:
SRPMS
- systemd-252-55.el9_7.7.ML.1.src.rpm
MD5: dd5894b976b9902fbc2236aa2051f45c
SHA-256: 851cd67cfc9d355943ff074409442bcfc6eec72dfde5dca8af1ee7f2e31074af
Size: 42.83 MB
Asianux Server 9 for x86_64
- rhel-net-naming-sysattrs-252-55.el9_7.7.ML.1.noarch.rpm
MD5: a982d7c79eac30b7cf88a78895314485
SHA-256: 85cb51b84bafb72bf096aeed04ab6e349773a05071b9376b4da2f0aff5e973c6
Size: 64.87 kB - systemd-252-55.el9_7.7.ML.1.i686.rpm
MD5: ff13bac0370fb808e1b783e382194941
SHA-256: ed9325888aaae291ef85271d4eb956f5e38900ead6d47eed97bfde5424b2b578
Size: 4.22 MB - systemd-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 880788de5017b38b3fc7cfc6cf0ac8ed
SHA-256: f451ba5b62cf36ca48a5024a5c16ecc962390de088a24bb284508638b3da6ce8
Size: 4.15 MB - systemd-boot-unsigned-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 7894db9c66755da5c32be2d910732820
SHA-256: 11dc07040e5cea3af950957a8e997e52ad2a33ba89d285e553688d7b2d0e3346
Size: 176.20 kB - systemd-container-252-55.el9_7.7.ML.1.i686.rpm
MD5: 748918357e210fa1bbc476bb37652c5c
SHA-256: a95702b1d80ac1ce64bd861525211dd72e589f5a8b69057df06f55b7a835c273
Size: 594.58 kB - systemd-container-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: a6ac71e593088a15a7f24cb9df2acfe5
SHA-256: b709aef799357984fee68dfe087287aeea032f9dd46e49728e80b6e9c79f5111
Size: 585.24 kB - systemd-devel-252-55.el9_7.7.ML.1.i686.rpm
MD5: 2d0b3e8e5fe1f5c2035ed0a2aa0abfd2
SHA-256: ba0e2fb108ec8266b41f1388e068f4940746bb3a49406858fa7c39edccf40290
Size: 669.29 kB - systemd-devel-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 131a93fdf09b8bc447f694036352b2c0
SHA-256: 1e5f9f0864d1bad6ad9152533c196957da477f8fdab80d5740411d0e9542c63d
Size: 669.27 kB - systemd-journal-remote-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 2a93989e98ec6cc969cc5ffff00dd976
SHA-256: ed6770d6c4753d47dbf1937550a0ff54bd8bec1a42a786e4639f338c71b9e7a9
Size: 152.09 kB - systemd-libs-252-55.el9_7.7.ML.1.i686.rpm
MD5: 06475ebbb5bd43fc2f1eb781208b8673
SHA-256: d9faaa77269325cdb48a62bf375fad0492bc2eedd027a4a758d93195bf346ea8
Size: 700.76 kB - systemd-libs-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 3c4a43124fe26d21debd1d0e8b4579ac
SHA-256: ca611221dd05c0c175213c8727dc12f8a38aab0989ac1391bf469fd5237bb44a
Size: 671.48 kB - systemd-oomd-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 96d02eba033efc383a6d9cf7272a8552
SHA-256: eb45674d5e8cb9fb5c3a61dfff54b5570a14ce4efb7585bc8f778ff3aa5073a2
Size: 111.48 kB - systemd-pam-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 7642f23d7a9443fbab9a43335be87b18
SHA-256: 2110111492d8d939497f1af30f50d1603ceca951ec27a9d16c31dfd84874cc21
Size: 278.62 kB - systemd-resolved-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: cd8b71dd7ee1f0d528c83207b5e2cb07
SHA-256: 8cb5ae00132777c7bdffd565901216c5fc9c3029b698e1dc09190282d663e941
Size: 384.96 kB - systemd-rpm-macros-252-55.el9_7.7.ML.1.noarch.rpm
MD5: 0fa2311f60fdf41fb20356d23ecb8620
SHA-256: e42f70b2e9f61e1750b9fadd539979c5345a6dd126a542a4afcab0e53c62af79
Size: 66.59 kB - systemd-udev-252-55.el9_7.7.ML.1.x86_64.rpm
MD5: 152987569c520acb2a9469f66c703d8b
SHA-256: 1c4038d89e572fb62b1e8e6bec4e33bfc655af8d457bd78da747d99161fe6411
Size: 2.01 MB - systemd-ukify-252-55.el9_7.7.ML.1.noarch.rpm
MD5: c0a09c52ee0de52addaebcf8214fb1a9
SHA-256: 20ee77faba27ab3a731a120873bd5e5ed07b6b7aef16895ee175337a1f66fd22
Size: 85.58 kB