Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

Early AI investor Elad Gil found his next big bet: AI-powered rollup

Sam Altman biographer Keach Hagey explains why the OpenAI CEO was ‘born for this moment’

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
Identity

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

userBy userMay 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 31, 2025Ravi LakshmananVulnerability / Linux

Linux flaws

According to the Qualys Threat Research Unit (TRU), two disclosure flaws have been identified in Ubuntu, Red Hat Enterprise Linux and Fedora’s core dump handlers Appport and SystemD-Coredump.

When tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are racial bugs that allow local attackers to gain access to access sensitive information. Tools like Appport and SystemD-Coredump are designed to handle crash reports and core dumps on Linux systems.

“These race conditions allow local attackers to exploit the SUID program and gain read access to the resulting core dump,” said Saeed Abbasi, product manager at Qualys Tru.

Cybersecurity

A brief explanation of the two defects can be found below –

CVE-2025-5054 (CVSS score: 4.7) – Includes race conditions 2.32.0 for standard Appport packages up to 2.32.0. Non-SUID binaries to access the original privileged process CoreDump allow attackers to read sensitive data such as / etc / shadow content loaded in the original process

SUID, short for SET user ID, is a special file permission that allows users to run programs with owner privileges rather than their own permission.

“When an application crashes, Appport tries to detect whether the crash process is running inside the container before performing a consistency check,” says Octavio Galland of Canonical.

“This means that if a local attacker induces a crash in a privileged process and quickly replaces it with another process with the same process ID in the mount and PID namespace, Appport will try to forward a core dump (which may contain sensitive information belonging to the original privileged process) into the namespace.”

Red Hat said CVE-2025-4598 has been rated moderately severity, noting that the high complexity in pulling vulnerability exploits means that attackers must first require racial conditions and own a poorly provided local account.

As a mitigation, Red Hat said that users can run the command “Echo 0>/proc/sys/fs/suid_dumpable” as the root user.

The “/proc/sys/fs/suid_dumpable” parameter essentially controls whether a SUID program can generate a core dump in a crash. By setting it to zero, it disables core dumps for all SUID programs and prevents them from being analyzed in the event of a crash.

“This will disable the ability to analyze crashes for such binary, whilst this vulnerability will not allow SystemD packages to be updated,” says Red Hat.

Similar recommendations have been issued by Amazon Linux, Debian, and Gentoo. It is worth noting that the Devine System is not affected by CVE-2025-4598 by default, as it does not contain a core dump handler unless the SystemD-Coredump package is installed manually. CVE-2025-4598 will not affect Ubuntu releases.

Cybersecurity

Qualys has also developed proof of concept (POC) code for both vulnerabilities, demonstrating how local attackers can leverage coredump in the crashed UNIX_CHKPWD process.

The impact of CVE-2025-5054 stated that the impact of CVE-2025-5054 is limited to the confidentiality of the memory space of the called SUID executable, and that POC exploits could have hashed and leak user passwords.

“Exploitation of the Appport and SystemD-Coredump vulnerabilities can significantly undermine high-risk confidentiality, as attackers can extract sensitive data such as passwords, encryption keys, and customer information from core dumps,” Abbasi said.

“Drawer fallout includes operational downtime, reputational damage, and potential violations of regulations. To effectively mitigate these multifaceted risks, businesses must prioritize patching and mitigation, enforce robust monitoring and tighten access controls, and adopt proactive security measures.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News
Next Article Afghanistan welcomes upgraded diplomatic ties with neighbouring Pakistan Taliban News
user
  • Website

Related Posts

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

Early AI investor Elad Gil found his next big bet: AI-powered rollup

Sam Altman biographer Keach Hagey explains why the OpenAI CEO was ‘born for this moment’

Indian general admits the loss of the jet in a clash with Pakistan: What he said is here | India and Pakistan tension news

Trending Posts

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

June 1, 2025

Indian general admits the loss of the jet in a clash with Pakistan: What he said is here | India and Pakistan tension news

June 1, 2025

Saudi Arabia calls Israel to ban Arab ministers’ West Bank trip “extremism” | Israeli-Palestinian conflict news

June 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.