Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Understand Helpdesk fraud and how to protect your organization

British Columbia’s key mineral sector will move green tomorrow

New Spotlight in the Event Planning Industry: International Confex Event Supplier Awards 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
Identity

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

userBy userMay 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 31, 2025Ravi LakshmananVulnerability / Linux

Linux flaws

According to the Qualys Threat Research Unit (TRU), two disclosure flaws have been identified in Ubuntu, Red Hat Enterprise Linux and Fedora’s core dump handlers Appport and SystemD-Coredump.

When tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are racial bugs that allow local attackers to gain access to access sensitive information. Tools like Appport and SystemD-Coredump are designed to handle crash reports and core dumps on Linux systems.

“These race conditions allow local attackers to exploit the SUID program and gain read access to the resulting core dump,” said Saeed Abbasi, product manager at Qualys Tru.

Cybersecurity

A brief explanation of the two defects can be found below –

CVE-2025-5054 (CVSS score: 4.7) – Includes race conditions 2.32.0 for standard Appport packages up to 2.32.0. Non-SUID binaries to access the original privileged process CoreDump allow attackers to read sensitive data such as / etc / shadow content loaded in the original process

SUID, short for SET user ID, is a special file permission that allows users to run programs with owner privileges rather than their own permission.

“When an application crashes, Appport tries to detect whether the crash process is running inside the container before performing a consistency check,” says Octavio Galland of Canonical.

“This means that if a local attacker induces a crash in a privileged process and quickly replaces it with another process with the same process ID in the mount and PID namespace, Appport will try to forward a core dump (which may contain sensitive information belonging to the original privileged process) into the namespace.”

Red Hat said CVE-2025-4598 has been rated moderately severity, noting that the high complexity in pulling vulnerability exploits means that attackers must first require racial conditions and own a poorly provided local account.

As a mitigation, Red Hat said that users can run the command “Echo 0>/proc/sys/fs/suid_dumpable” as the root user.

The “/proc/sys/fs/suid_dumpable” parameter essentially controls whether a SUID program can generate a core dump in a crash. By setting it to zero, it disables core dumps for all SUID programs and prevents them from being analyzed in the event of a crash.

“This will disable the ability to analyze crashes for such binary, whilst this vulnerability will not allow SystemD packages to be updated,” says Red Hat.

Similar recommendations have been issued by Amazon Linux, Debian, and Gentoo. It is worth noting that the Devine System is not affected by CVE-2025-4598 by default, as it does not contain a core dump handler unless the SystemD-Coredump package is installed manually. CVE-2025-4598 will not affect Ubuntu releases.

Cybersecurity

Qualys has also developed proof of concept (POC) code for both vulnerabilities, demonstrating how local attackers can leverage coredump in the crashed UNIX_CHKPWD process.

The impact of CVE-2025-5054 stated that the impact of CVE-2025-5054 is limited to the confidentiality of the memory space of the called SUID executable, and that POC exploits could have hashed and leak user passwords.

“Exploitation of the Appport and SystemD-Coredump vulnerabilities can significantly undermine high-risk confidentiality, as attackers can extract sensitive data such as passwords, encryption keys, and customer information from core dumps,” Abbasi said.

“Drawer fallout includes operational downtime, reputational damage, and potential violations of regulations. To effectively mitigate these multifaceted risks, businesses must prioritize patching and mitigation, enforce robust monitoring and tighten access controls, and adopt proactive security measures.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News
Next Article Afghanistan welcomes upgraded diplomatic ties with neighbouring Pakistan Taliban News
user
  • Website

Related Posts

Understand Helpdesk fraud and how to protect your organization

June 3, 2025

Google Chrome implements distrust and issues over two certificate authorities over compliance

June 3, 2025

Reduce attribution confusion in Microsoft and CrowdStrike launches shared threat actor glossary

June 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Understand Helpdesk fraud and how to protect your organization

British Columbia’s key mineral sector will move green tomorrow

New Spotlight in the Event Planning Industry: International Confex Event Supplier Awards 2025

Key tips for making your innovation fund successful

Trending Posts

Earthquakes cause mass escape from Pakistan prisons | News

June 3, 2025

Mount Etna in Italy places spectacular displays when erupting in Sicily | Volcanic News

June 3, 2025

Mongolian Prime Minister has been expelled amid protests of corruption | Political News

June 3, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Coinsbee surpasses 5,000 gift card brands and has become the world’s largest crypto gift card platform

Top Startups and High-Tech Funding News – June 2, 2025

Elon Musk’s Brain Tech Startup Neuralink raises $650 million in Series E funding

Fisent raises $2 million to advance enterprise-applied Genai process automation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.