Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Helwan Linux, Quarkdown, Konsole Tweaks, Keyboard Shortcuts and More Linux Stuff

    June 7, 2025

    Huge Market Opportunity for MSPs

    June 7, 2025

    Optimizing LLM-based trip planning

    June 7, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
    Cyber Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    MichaBy MichaJune 2, 2025No Comments4 Mins Read
    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora


    Introduction

    Recent discoveries have unveiled critical vulnerabilities in popular Linux systems, namely Apport and Systemd-Coredump. Identified by the Qualys Threat Research Unit (TRU), these flaws, tracked as CVE-2025-5054 and CVE-2025-4598, pose significant risks for data confidentiality. In this article, we will explore these vulnerabilities and their impact on cyber security, offering practical mitigation strategies for users and administrators.

    Understanding the Vulnerabilities

    Both CVE-2025-5054 and CVE-2025-4598 are classified as race condition bugs, primarily affecting Ubuntu, Red Hat Enterprise Linux, and Fedora. They enable local attackers to access sensitive information through poorly secured core dump handlers.

    CVE-2025-5054 Overview

    This vulnerability, which has a CVSS score of 4.7, exists in the Canonical Apport package (up to version 2.32.0). Attackers can exploit it by leveraging PID-reuse in namespaces, allowing them to leak sensitive information from the crashed processes.

    CVE-2025-4598 Overview

    Also rated at a CVSS score of 4.7, CVE-2025-4598 affects the Systemd-Coredump handler. This flaw permits attackers to crash a SUID process and substitute it with a non-SUID binary, enabling unauthorized access to privileged process core dumps. These core dumps may contain highly sensitive data, including stored passwords from files like /etc/shadow.

    The Mechanism of Exploitation

    SUID, or Set User ID, allows users to run programs with the privileges of the program’s owner rather than their own. This means that if a privileged process crashes, attackers can exploit this mechanism to access the core dumps that may contain sensitive information. Canonical’s Octavio Galland explained that Apport checks whether a crashing process was running inside a container. If exploited correctly, this oversight can lead to significant data breaches.

    Severity Levels and Exploit Complexity

    Red Hat has assessed CVE-2025-4598 as having a Moderate severity level due to the high complexity required to exploit it. An attacker must not only initiate the race condition but also be in possession of a local, unprivileged user account.

    Mitigation Strategies

    To protect against these vulnerabilities, several mitigation strategies should be considered:

    Disabling Core Dumps

    Users can execute the following command as a root user to prevent SUID binaries from generating core dumps:

    echo 0 > /proc/sys/fs/suid_dumpable

    While this effectively disables core dumps and mitigates the current vulnerabilities, it also prevents the analysis of crashes involving such binaries.

    Staying Updated

    Regularly update system packages to the latest versions to ensure that known vulnerabilities are patched. Utilizing rapid patch management is crucial for safeguarding systems from potential attacks.

    Broader Implications of the Vulnerabilities

    The exploitation of these vulnerabilities could have devastating consequences for organizations, including data breaches, operational downtime, reputational harm, and regulatory non-compliance. As Saeed Abbasi from Qualys TRU stated, attackers could potentially extract sensitive information like passwords or encryption keys from core dumps, emphasizing the need for robust cyber security measures.

    Conclusion

    With the continuing evolution of cyber threats, understanding vulnerabilities such as CVE-2025-5054 and CVE-2025-4598 is essential for maintaining data security. Enterprises need to prioritize proactive measures, such as stringent monitoring and improved access controls, to mitigate the risks associated with these flaws.

    FAQ

    Question 1: What are SUID permissions and why are they important in cyber security?

    SUID (Set User ID) permissions allow users to execute programs with the privileges of the program’s owner. This is crucial for tasks requiring higher access levels, but it can lead to vulnerabilities if not properly managed.

    Question 2: How can I check if my system is vulnerable to CVE-2025-5054 or CVE-2025-4598?

    To determine vulnerability, check the version of Apport and Systemd-Coredump packages running on your system. Ensure you are running the latest patches as outlined by your distribution’s advisories.

    Question 3: Are there any tools available for monitoring SUID binaries?

    Yes, tools like Lynis and OSSEC can help monitor and analyze the security of SUID binaries, providing insights on potential vulnerabilities and suggesting necessary actions.



    Read the original article

    0 Like this
    Core Dumps Fedora flaws Hash Linux Password RHEL Theft Ubuntu
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleThis AI Paper Introduces ARM and Ada-GRPO: Adaptive Reasoning Models for Efficient and Scalable Problem-Solving
    Next Article 6 Ways macOS Beats Windows

    Related Posts

    Linux

    Helwan Linux, Quarkdown, Konsole Tweaks, Keyboard Shortcuts and More Linux Stuff

    June 7, 2025
    Cyber Security

    Huge Market Opportunity for MSPs

    June 7, 2025
    Linux

    Windows Subsystem for Linux is now Open Source

    June 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.