• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

New Linux Flaws Enable Password Hash Theft through Core Dumps in Ubuntu, RHEL, Fedora

Admin by Admin
June 1, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Might 31, 2025Ravie LakshmananVulnerability / Linux

Linux Flaws

Two data disclosure flaws have been recognized in apport and systemd-coredump, the core dump handlers in Ubuntu, Purple Hat Enterprise Linux, and Fedora, in line with the Qualys Menace Analysis Unit (TRU).

Tracked as CVE-2025-5054 and CVE-2025-4598, each vulnerabilities are race situation bugs that might allow an area attacker to acquire entry to entry delicate data. Instruments like Apport and systemd-coredump are designed to deal with crash reporting and core dumps in Linux programs.

“These race situations permit an area attacker to use a SUID program and acquire learn entry to the ensuing core dump,” Saeed Abbasi, supervisor of product at Qualys TRU, mentioned.

Cybersecurity

A quick description of the 2 flaws is under –

  • CVE-2025-5054 (CVSS rating: 4.7) – A race situation in Canonical apport bundle as much as and together with 2.32.0 that permits an area attacker to leak delicate data through PID-reuse by leveraging namespaces
  • CVE-2025-4598 (CVSS rating: 4.7) – A race situation in systemd-coredump that permits an attacker to pressure a SUID course of to crash and exchange it with a non-SUID binary to entry the unique’s privileged course of coredump, permitting the attacker to learn delicate information, reminiscent of /and so on/shadow content material, loaded by the unique course of

SUID, quick for Set Person ID, is a particular file permission that permits a person to execute a program with the privileges of its proprietor, moderately than their very own permissions.

“When analyzing software crashes, apport makes an attempt to detect if the crashing course of was working inside a container earlier than performing consistency checks on it,” Canonical’s Octavio Galland mentioned.

“Which means that if an area attacker manages to induce a crash in a privileged course of and shortly replaces it with one other one with the identical course of ID that resides inside a mount and pid namespace, apport will try to ahead the core dump (which could include delicate data belonging to the unique, privileged course of) into the namespace.”

Purple Hat mentioned CVE-2025-4598 has been rated Reasonable in severity owing to the excessive complexity in pulling an exploit for the vulnerability, noting that the attacker has to first win the race situation and be in possession of an unprivileged native account.

As mitigations, Purple Hat mentioned customers can run the command “echo 0 > /proc/sys/fs/suid_dumpable” as a root person to disable the power of a system to generate a core dump for SUID binaries.

The “/proc/sys/fs/suid_dumpable” parameter basically controls whether or not SUID packages can produce core dumps following a crash. By setting it to zero, it disables core dumps for all SUID packages and prevents them from being analyzed within the occasion of a crash.

“Whereas this mitigates this vulnerability whereas it isn’t potential to replace the systemd bundle, it disables the aptitude of analyzing crashes for such binaries,” Purple Hat mentioned.

Comparable advisories have been issued by Amazon Linux, Debian, and Gentoo. It is value noting that Debian programs aren’t prone to CVE-2025-4598 by default, since they do not embrace any core dump handler except the systemd-coredump bundle is manually put in. CVE-2025-4598 doesn’t have an effect on Ubuntu releases.

Cybersecurity

Qualys has additionally developed proof-of-concept (PoC) code for each vulnerabilities, demonstrating how an area attacker can exploit the coredump of a crashed unix_chkpwd course of, which is used to confirm the validity of a person’s password, to acquire password hashes from the /and so on/shadow file.

Canonical, in an alert of its personal, mentioned the influence of CVE-2025-5054 is restricted to the confidentiality of the reminiscence house of invoked SUID executables and that the PoC exploit can leak hashed person passwords has restricted real-world influence.

“The exploitation of vulnerabilities in Apport and systemd-coredump can severely compromise the confidentiality at excessive danger, as attackers might extract delicate information, like passwords, encryption keys, or buyer data from core dumps,” Abbasi mentioned.

“The fallout consists of operational downtime, reputational injury, and potential non-compliance with rules. To mitigate these multifaceted dangers successfully, enterprises ought to undertake proactive safety measures by prioritizing patches and mitigations, imposing strong monitoring, and tightening entry controls.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.



Tags: CoreDumpsFedoraFlawsHashLinuxPasswordRHELTheftUbuntu
Admin

Admin

Next Post
Google Search Rating Volatility, Internet Publishing Useless, AI Mode Search Console Information & AI Mode Scares SEOs

Google Search Rating Volatility, Internet Publishing Useless, AI Mode Search Console Information & AI Mode Scares SEOs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Breachforums Boss to Pay $700k in Healthcare Breach – Krebs on Safety

Breachforums Boss to Pay $700k in Healthcare Breach – Krebs on Safety

May 16, 2025
From School to Company: My Journey to The Bliss Group

From School to Company: My Journey to The Bliss Group

April 9, 2025

Trending.

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos Information

Industrial-strength April Patch Tuesday covers 135 CVEs – Sophos Information

April 10, 2025
Expedition 33 Guides, Codex, and Construct Planner

Expedition 33 Guides, Codex, and Construct Planner

April 26, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

Important SAP Exploit, AI-Powered Phishing, Main Breaches, New CVEs & Extra

April 28, 2025
Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi

Wormable AirPlay Flaws Allow Zero-Click on RCE on Apple Units by way of Public Wi-Fi

May 5, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Yoast AI Optimize now out there for Basic Editor • Yoast

Replace on Yoast AI Optimize for Traditional Editor  • Yoast

June 18, 2025
You’ll at all times keep in mind this because the day you lastly caught FamousSparrow

You’ll at all times keep in mind this because the day you lastly caught FamousSparrow

June 18, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved