Please consider backporting coredump %F patch to stable kernels

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dear stable maintainer(s),

The following series was merged for 6.16:

https://lore.kernel.org/all/20250414-work-coredump-v2-0-685bf231f828@xxxxxxxxxx/

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c57f07b235871c9e5bffaccd458dca2d9a62b164
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95c5f43181fe9c1b5e5a4bd3281c857a5259991f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea

This allows the userspace coredump handler to get a PIDFD referencing
the crashed process.

We have discovered that there are real world exploits that can be used
to trick coredump handling userspace software to act on foreign
processes due to PID reuse attacks:

https://security-tracker.debian.org/tracker/CVE-2025-4598

We have fixed the worst case scenario, but to really and
comprehensively fix the whole problem we need this new %F option. We
have backported the userspace side to the systemd stable branch. Would
it be possible to backport the above 3 patches to at least the 6.12
series, so that the next Debian stable can be fully covered? The first
two are small bug fixes so it would be good to have them, and the
third one is quite small and unless explicitly configured in the
core_pattern, it will be inert, so risk should be low.

Thanks!




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux