Ò»¡¢Îó²î¸ÅÊö
Îó²îÃû³Æ | glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²î |
CVE ID | CVE-2025-4802 |
Îó²îÀàÐÍ | ´úÂëÖ´ÐÐ | ·¢Ã÷ʱ¼ä | 2025-05-20 |
Îó²îÆÀ·Ö | 9.8 | Îó²îÆ·¼¶ | ÑÏÖØ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ʹÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ²»ÐèÒª |
PoC/EXP | δ¹ûÕæ | ÔÚҰʹÓà | δ·¢Ã÷ |
setuid¶þ½øÖÆÎļþÊǾßÓÐÌØÊâȨÏ޵ijÌÐò£¬£¬£¬£¬£¬£¬¿ÉÒÔÒÔÎļþÓµÓÐÕßµÄÉí·ÝÖ´ÐС£¡£¡£dlopenÊÇÒ»¸ö¶¯Ì¬¼ÓÔØ¿âµÄº¯Êý£¬£¬£¬£¬£¬£¬Í¨³£ÓÃÓÚÔÚÔËÐÐʱ¼ÓÔØ¹²Ïí¿â¡£¡£¡£
2025Äê5ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬bevictorΰµÂ¼¯ÍÅVSRC¼à²âµ½glibc¾²Ì¬setuid³ÌÐòdlopen´úÂëÖ´ÐÐÎó²îCVE-2025-4802¡£¡£¡£¸ÃÎó²î±£´æÓÚGNU C¿â£¨glibc£©ÖУ¬£¬£¬£¬£¬£¬Ó°Ï쾲̬Á´½ÓµÄsetuid¶þ½øÖÆÎļþ¡£¡£¡£Îó²îÔ´ÓÚ¾²Ì¬setuid³ÌÐòÔÚŲÓÃdlopenʱ¹ýʧµØÊ¹ÓÃLD_LIBRARY_PATHÇéÐαäÁ¿²éÕÒ¹²Ïí¿â£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¼ÓÔØ¶ñÒâ¿â²¢Ö´Ðй¥»÷Õß¿ØÖƵĴúÂë¡£¡£¡£¸ÃÎó²îµÄ¿ÉʹÓÃÐԽϵͣ¬£¬£¬£¬£¬£¬ËüÒªÇó³ÌÐòΪ¾²Ì¬Á´½ÓµÄsetuid³ÌÐò£¬£¬£¬£¬£¬£¬²¢ÇÒŲÓÃdlopen¡£¡£¡£Îó²î¼¶±ðÑÏÖØ£¬£¬£¬£¬£¬£¬Îó²îÆÀ·Ö9.8·Ö¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
ÔËÐÐglibc°æ±¾Îª2.27ÖÁ2.38µÄLinuxϵͳ£¨ÈçRocky Linux¡¢Debian¡¢UbuntuµÈ£©¿ÉÄÜÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÌØÊâÊÇʹÓþ²Ì¬setuid¶þ½øÖÆÎļþµÄϵͳ¡£¡£¡£
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
¹Ù·½ÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬½¨ÒéÊÜÓ°ÏìÓû§¾¡¿ìÉý¼¶µ½glibc 2.39»ò¸ü¸ß°æ±¾¡£¡£¡£ÔÚDebian/UbuntuϵͳÖУºsudo apt update && sudo apt upgrade libc6ÔÚRocky Linux/CentOSϵͳÖУºsudo dnf update glibc
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£¡£¡£
3.3 ͨÓý¨Òé
? °´ÆÚ¸üÐÂϵͳ²¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£? ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£? ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£? ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£? ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.openwall.com/lists/oss-security/2025/05/17/2https://sourceware.org/bugzilla/show_bug.cgi?id=32976