newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
Technology

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

June 2, 2025 4 Min Read
Share
New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
SHARE

According to the Qualys Threat Research Unit (TRU), two disclosure flaws have been identified in Ubuntu, Red Hat Enterprise Linux and Fedora’s core dump handlers Appport and SystemD-Coredump.

When tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are racial bugs that allow local attackers to gain access to access sensitive information. Tools like Appport and SystemD-Coredump are designed to handle crash reports and core dumps on Linux systems.

“These race conditions allow local attackers to exploit the SUID program and gain read access to the resulting core dump,” said Saeed Abbasi, product manager at Qualys Tru.

A brief explanation of the two defects can be found below –

  • CVE-2025-5054 (CVSS score: 4.7) – Race conditions for standard Appport packages up to 2.32.0 that allow local attackers to leak sensitive information via PID -Reuse by leveraging namespaces
  • CVE-2025-4598 (CVSS Score: 4.7) – With the racing condition of SystemD-Coredump that forces an attacker to crash a SUID process and allows the attacker to access the original privileged process CoreDump, allowing the attacker to read sensitive data such as /etc /shadow content loaded into the original process.

SUID, short for SET user ID, is a special file permission that allows users to run programs with owner privileges rather than their own permission.

“When an application crashes, Appport tries to detect whether the crash process is running inside the container before performing a consistency check,” says Octavio Galland of Canonical.

“This means that if a local attacker induces a crash in a privileged process and quickly replaces it with another process with the same process ID in the mount and PID namespace, Appport will try to forward a core dump (which may contain sensitive information belonging to the original privileged process) into the namespace.”

See also  Can AI solve the Loneliness epidemic?

According to Red Hat, CVE-2025-4598 has been rated moderately severity, noting that the high complexity in pulling vulnerability exploits means that attackers must first win racial conditions and own local accounts in non-residential places.

As a mitigation, Red Hat said that users can run the command “Echo 0>/proc/sys/fs/suid_dumpable” as the root user.

The “/proc/sys/fs/suid_dumpable” parameter essentially controls whether a SUID program can generate a core dump after a crash. By setting it to zero, it disables core dumps for all SUID programs and prevents them from being analyzed in the event of a crash.

“This will disable the ability to analyze crashes for such binary, whilst this vulnerability will not allow SystemD packages to be updated,” says Red Hat.

Similar recommendations have been issued by Amazon Linux, Debian, and Gentoo. It is worth noting that the Devine System is not affected by CVE-2025-4598 by default, as it does not contain a core dump handler unless the SystemD-Coredump package is installed manually. CVE-2025-4598 will not affect Ubuntu releases.

Qualys has also developed proof of concept (POC) code for both vulnerabilities, demonstrating how local attackers can leverage coredump in the crashed UNIX_CHKPWD process.

The impact of CVE-2025-5054 stated that the impact of CVE-2025-5054 is limited to the confidentiality of the memory space of the called SUID executable, and that POC exploits could have hashed and leak user passwords.

“Exploitation of the Appport and SystemD-Coredump vulnerabilities can significantly undermine high-risk confidentiality, as attackers can extract sensitive data such as passwords, encryption keys, and customer information from core dumps,” Abbasi said.

See also  Research says AI behaves differently when it is known to be tested.

“Drawer fallout includes operational downtime, reputational damage, and potential violations of regulations. To effectively mitigate these multifaceted risks, businesses must prioritize patching and mitigation, enforce robust monitoring and tighten access controls, and adopt proactive security measures.”

Share This Article
Facebook Twitter Copy Link
Previous Article Fake recruiters email target CFOs using legal netbird tools in six global regions Fake recruiters email target CFOs using legal netbird tools in six global regions
Next Article Diablo Immortal celebrates birthdays with lots of events and prizes Diablo Immortal celebrates birthdays with lots of events and prizes
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Important 10-year-old round cube webmail bug allows authenticated users to execute malicious code
Technology

Important 10-year-old round cube webmail bug allows authenticated users to execute malicious code

2 Min Read
HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass
Technology

HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass

2 Min Read
Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam
Technology

Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam

4 Min Read
Malicious Peep, NPM and Ruby Packages exposed in an ongoing open source supply chain attack
Technology

Malicious Peep, NPM and Ruby Packages exposed in an ongoing open source supply chain attack

9 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?