Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Know-how issues, however what issues extra is how we use it: MICA Director Jaya Deshmukh

December 27, 2025

CarDekho invests $10M in CollegeDekho

December 27, 2025

MassRobotics Launches the AMD Robotics Innovation Problem, Leveraging Adaptive Computing for Edge Robotics Functions

December 27, 2025
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Know-how issues, however what issues extra is how we use it: MICA Director Jaya Deshmukh
  • CarDekho invests $10M in CollegeDekho
  • MassRobotics Launches the AMD Robotics Innovation Problem, Leveraging Adaptive Computing for Edge Robotics Functions
  • The 12 largest area tales of 2025 — in line with you
  • The Position of Attorneys in Guaranteeing Pedestrian Security: What You Must Know
  • World Community Tools-Constructing System (NEBS) Testing and Certification Providers Market is projected to achieve the worth of USD 4.99 billion by 2030.
  • techAU drops 7-Observe Second Album ‘Overclocked’ simply 48 hours after debut
  • CleanTechnica Unique: Inside Santa’s International Refueling Community
Saturday, December 27
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - New Linux Flaws Enable Password Hash Theft through Core Dumps in Ubuntu, RHEL, Fedora
Cybersecurity & Digital Rights

New Linux Flaws Enable Password Hash Theft through Core Dumps in Ubuntu, RHEL, Fedora

NextTechBy NextTechJune 1, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
New Linux Flaws Enable Password Hash Theft through Core Dumps in Ubuntu, RHEL, Fedora
Share
Facebook Twitter LinkedIn Pinterest Email


Could 31, 2025Ravie LakshmananVulnerability / Linux

Two data disclosure flaws have been recognized in apport and systemd-coredump, the core dump handlers in Ubuntu, Purple Hat Enterprise Linux, and Fedora, in accordance with the Qualys Risk Analysis Unit (TRU).

Tracked as CVE-2025-5054 and CVE-2025-4598, each vulnerabilities are race situation bugs that might allow an area attacker to acquire entry to entry delicate data. Instruments like Apport and systemd-coredump are designed to deal with crash reporting and core dumps in Linux techniques.

“These race situations enable an area attacker to take advantage of a SUID program and achieve learn entry to the ensuing core dump,” Saeed Abbasi, supervisor of product at Qualys TRU, stated.

Cybersecurity

A quick description of the 2 flaws is beneath –

  • CVE-2025-5054 (CVSS rating: 4.7) – A race situation in Canonical apport bundle as much as and together with 2.32.0 that permits an area attacker to leak delicate data through PID-reuse by leveraging namespaces
  • CVE-2025-4598 (CVSS rating: 4.7) – A race situation in systemd-coredump that permits an attacker to pressure a SUID course of to crash and change it with a non-SUID binary to entry the unique’s privileged course of coredump, permitting the attacker to learn delicate knowledge, reminiscent of /and many others/shadow content material, loaded by the unique course of

SUID, brief for Set Consumer ID, is a particular file permission that permits a consumer to execute a program with the privileges of its proprietor, moderately than their very own permissions.

“When analyzing utility crashes, apport makes an attempt to detect if the crashing course of was working inside a container earlier than performing consistency checks on it,” Canonical’s Octavio Galland stated.

“Which means that if an area attacker manages to induce a crash in a privileged course of and rapidly replaces it with one other one with the identical course of ID that resides inside a mount and pid namespace, apport will try and ahead the core dump (which could comprise delicate data belonging to the unique, privileged course of) into the namespace.”

Purple Hat stated CVE-2025-4598 has been rated Reasonable in severity owing to the excessive complexity in pulling an exploit for the vulnerability, noting that the attacker has to first the race situation and be in possession of an unprivileged native account.

As mitigations, Purple Hat stated customers can run the command “echo 0 > /proc/sys/fs/suid_dumpable” as a root consumer to disable the power of a system to generate a core dump for SUID binaries.

The “/proc/sys/fs/suid_dumpable” parameter basically controls whether or not SUID packages can produce core dumps on the crash. By setting it to zero, it disables core dumps for all SUID packages and prevents them from being analyzed within the occasion of a crash.

“Whereas this mitigates this vulnerability whereas it is not potential to replace the systemd bundle, it disables the potential of analyzing crashes for such binaries,” Purple Hat stated.

Comparable advisories have been issued by Amazon Linux, Debian, and Gentoo. It is value noting that Debian techniques aren’t inclined to CVE-2025-4598 by default, since they do not embody any core dump handler except the systemd-coredump bundle is manually put in. CVE-2025-4598 doesn’t have an effect on Ubuntu releases.

Cybersecurity

Qualys has additionally developed proof-of-concept (PoC) code for each vulnerabilities, demonstrating how an area attacker can exploit the coredump of a crashed unix_chkpwd course of, which is used to confirm the validity of a consumer’s password, to acquire password hashes from the /and many others/shadow file.

Canonical, in an alert of its personal, stated the influence of CVE-2025-5054 is restricted to the confidentiality of the reminiscence house of invoked SUID executables and that the PoC exploit can leak hashed consumer passwords has restricted real-world influence.

“The exploitation of vulnerabilities in Apport and systemd-coredump can severely compromise the confidentiality at excessive threat, as attackers might extract delicate knowledge, like passwords, encryption keys, or buyer data from core dumps,” Abbasi stated.

“The fallout contains operational downtime, reputational injury, and potential non-compliance with laws. To mitigate these multifaceted dangers successfully, enterprises ought to undertake proactive safety measures by prioritizing patches and mitigations, implementing strong monitoring, and tightening entry controls.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

New MongoDB Flaw Lets Unauthenticated Attackers Learn Uninitialized Reminiscence

December 27, 2025

Belief Pockets Chrome Extension Breach Induced $7 Million Crypto Loss by way of Malicious Code

December 26, 2025

Santa Claus doesn’t exist (in accordance with AI) • Graham Cluley

December 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Economy News

Know-how issues, however what issues extra is how we use it: MICA Director Jaya Deshmukh

By NextTechDecember 27, 2025

Ahmedabad (Gujarat) [India], December 27: MICA –The Faculty of Concepts on Sunday hosted “Empowering Individuals…

CarDekho invests $10M in CollegeDekho

December 27, 2025

MassRobotics Launches the AMD Robotics Innovation Problem, Leveraging Adaptive Computing for Edge Robotics Functions

December 27, 2025
Top Trending

Know-how issues, however what issues extra is how we use it: MICA Director Jaya Deshmukh

By NextTechDecember 27, 2025

Ahmedabad (Gujarat) [India], December 27: MICA –The Faculty of Concepts on Sunday…

CarDekho invests $10M in CollegeDekho

By NextTechDecember 27, 2025

CarDekho Group, the auto categorized platform, has introduced an funding of $10…

MassRobotics Launches the AMD Robotics Innovation Problem, Leveraging Adaptive Computing for Edge Robotics Functions

By NextTechDecember 27, 2025

MassRobotics, the main robotics innovation hub on this planet, is thrilled to…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!