Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Using MITRE D3FEND to strengthen you home network

September 8, 2025

Speed Isn’t Everything When Buying SSDs

September 8, 2025

Debian 13.1 Released With An Initial Batch Of Fixes

September 8, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
Cyber Security

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

MichaBy MichaJune 2, 2025No Comments4 Mins Read
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora


Introduction

Recent discoveries have unveiled critical vulnerabilities in popular Linux systems, namely Apport and Systemd-Coredump. Identified by the Qualys Threat Research Unit (TRU), these flaws, tracked as CVE-2025-5054 and CVE-2025-4598, pose significant risks for data confidentiality. In this article, we will explore these vulnerabilities and their impact on cyber security, offering practical mitigation strategies for users and administrators.

Understanding the Vulnerabilities

Both CVE-2025-5054 and CVE-2025-4598 are classified as race condition bugs, primarily affecting Ubuntu, Red Hat Enterprise Linux, and Fedora. They enable local attackers to access sensitive information through poorly secured core dump handlers.

CVE-2025-5054 Overview

This vulnerability, which has a CVSS score of 4.7, exists in the Canonical Apport package (up to version 2.32.0). Attackers can exploit it by leveraging PID-reuse in namespaces, allowing them to leak sensitive information from the crashed processes.

CVE-2025-4598 Overview

Also rated at a CVSS score of 4.7, CVE-2025-4598 affects the Systemd-Coredump handler. This flaw permits attackers to crash a SUID process and substitute it with a non-SUID binary, enabling unauthorized access to privileged process core dumps. These core dumps may contain highly sensitive data, including stored passwords from files like /etc/shadow.

The Mechanism of Exploitation

SUID, or Set User ID, allows users to run programs with the privileges of the program’s owner rather than their own. This means that if a privileged process crashes, attackers can exploit this mechanism to access the core dumps that may contain sensitive information. Canonical’s Octavio Galland explained that Apport checks whether a crashing process was running inside a container. If exploited correctly, this oversight can lead to significant data breaches.

Severity Levels and Exploit Complexity

Red Hat has assessed CVE-2025-4598 as having a Moderate severity level due to the high complexity required to exploit it. An attacker must not only initiate the race condition but also be in possession of a local, unprivileged user account.

Mitigation Strategies

To protect against these vulnerabilities, several mitigation strategies should be considered:

Disabling Core Dumps

Users can execute the following command as a root user to prevent SUID binaries from generating core dumps:

echo 0 > /proc/sys/fs/suid_dumpable

While this effectively disables core dumps and mitigates the current vulnerabilities, it also prevents the analysis of crashes involving such binaries.

Staying Updated

Regularly update system packages to the latest versions to ensure that known vulnerabilities are patched. Utilizing rapid patch management is crucial for safeguarding systems from potential attacks.

Broader Implications of the Vulnerabilities

The exploitation of these vulnerabilities could have devastating consequences for organizations, including data breaches, operational downtime, reputational harm, and regulatory non-compliance. As Saeed Abbasi from Qualys TRU stated, attackers could potentially extract sensitive information like passwords or encryption keys from core dumps, emphasizing the need for robust cyber security measures.

Conclusion

With the continuing evolution of cyber threats, understanding vulnerabilities such as CVE-2025-5054 and CVE-2025-4598 is essential for maintaining data security. Enterprises need to prioritize proactive measures, such as stringent monitoring and improved access controls, to mitigate the risks associated with these flaws.

FAQ

Question 1: What are SUID permissions and why are they important in cyber security?

SUID (Set User ID) permissions allow users to execute programs with the privileges of the program’s owner. This is crucial for tasks requiring higher access levels, but it can lead to vulnerabilities if not properly managed.

Question 2: How can I check if my system is vulnerable to CVE-2025-5054 or CVE-2025-4598?

To determine vulnerability, check the version of Apport and Systemd-Coredump packages running on your system. Ensure you are running the latest patches as outlined by your distribution’s advisories.

Question 3: Are there any tools available for monitoring SUID binaries?

Yes, tools like Lynis and OSSEC can help monitor and analyze the security of SUID binaries, providing insights on potential vulnerabilities and suggesting necessary actions.



Read the original article

0 Like this
Core Dumps Fedora flaws Hash Linux Password RHEL Theft Ubuntu
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleThis AI Paper Introduces ARM and Ada-GRPO: Adaptive Reasoning Models for Efficient and Scalable Problem-Solving
Next Article 6 Ways macOS Beats Windows

Related Posts

Linux

How to Check Command Exit Status in Linux

September 8, 2025
Linux

7 Must-Have Free Odoo Apps for Linux in 2025

September 4, 2025
Linux

New Gerhwin DE, grep Command, Nitro init system, KDE Customization and More Linux Stuff

September 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.