Ò»¡¢Îó²î¸ÅÊö
Îó²îÃû³Æ | glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²î |
CVE ID | CVE-2025-4802 |
Îó²îÀàÐÍ | ´úÂëÖ´ÐÐ | ·¢Ã÷ʱ¼ä | 2025-05-20 |
Îó²îÆÀ·Ö | 9.8 | Îó²îÆ·¼¶ | ÑÏÖØ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ʹÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ²»ÐèÒª |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | δ·¢Ã÷ |
setuid¶þ½øÖÆÎļþÊǾßÓÐÌØÊâȨÏ޵ijÌÐò£¬£¬£¬£¬£¬¿ÉÒÔÒÔÎļþÓµÓÐÕßµÄÉí·ÝÖ´ÐС£¡£¡£¡£¡£dlopenÊÇÒ»¸ö¶¯Ì¬¼ÓÔØ¿âµÄº¯Êý£¬£¬£¬£¬£¬Í¨³£ÓÃÓÚÔÚÔËÐÐʱ¼ÓÔØ¹²Ïí¿â¡£¡£¡£¡£¡£
2025Äê5ÔÂ20ÈÕ£¬£¬£¬£¬£¬¼øºÚµ£±£Íø¼¯ÍÅVSRC¼à²âµ½glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²îCVE-2025-4802¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚGNU C¿â£¨glibc£©ÖУ¬£¬£¬£¬£¬Ó°Ï쾲̬Á´½ÓµÄsetuid¶þ½øÖÆÎļþ¡£¡£¡£¡£¡£Îó²îÔ´ÓÚ¾²Ì¬setuid³ÌÐòÔÚŲÓÃdlopenʱ¹ýʧµØÊ¹ÓÃLD_LIBRARY_PATHÇéÐαäÁ¿²éÕÒ¹²Ïí¿â£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¼ÓÔØ¶ñÒâ¿â²¢Ö´Ðй¥»÷Õß¿ØÖƵĴúÂë¡£¡£¡£¡£¡£¸ÃÎó²îµÄ¿ÉʹÓÃÐԽϵͣ¬£¬£¬£¬£¬ËüÒªÇó³ÌÐòΪ¾²Ì¬Á´½ÓµÄsetuid³ÌÐò£¬£¬£¬£¬£¬²¢ÇÒŲÓÃdlopen¡£¡£¡£¡£¡£Îó²î¼¶±ðÑÏÖØ£¬£¬£¬£¬£¬Îó²îÆÀ·Ö9.8·Ö¡£¡£¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
ÔËÐÐglibc°æ±¾Îª2.27ÖÁ2.38µÄLinuxϵͳ£¨ÈçRocky Linux¡¢Debian¡¢UbuntuµÈ£©¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬£¬ÌØÊâÊÇʹÓþ²Ì¬setuid¶þ½øÖÆÎļþµÄϵͳ¡£¡£¡£¡£¡£
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
¹Ù·½ÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬½¨ÒéÊÜÓ°ÏìÓû§¾¡¿ìÉý¼¶µ½glibc 2.39»ò¸ü¸ß°æ±¾¡£¡£¡£¡£¡£ÔÚDebian/UbuntuϵͳÖУºsudo apt update && sudo apt upgrade libc6ÔÚRocky Linux/CentOSϵͳÖУºsudo dnf update glibc
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£¡£¡£¡£¡£
3.3 ͨÓý¨Òé
? °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£¡£¡£? ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£¡£¡£? ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£¡£¡£? ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£¡£¡£? ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.openwall.com/lists/oss-security/2025/05/17/2https://sourceware.org/bugzilla/show_bug.cgi?id=32976