• About
  • Disclaimer
  • Privacy Policy
  • Contact
Sunday, July 20, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

New Linux Vulnerabilities Expose Password Hashes by way of Core Dumps

Md Sazzad Hossain by Md Sazzad Hossain
0
New Linux Vulnerabilities Expose Password Hashes by way of Core Dumps
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Navigating the labyrinth of forks

Welcoming Aura to Have I Been Pwned’s Associate Program

Risk actors scanning for apps incorporating weak Spring Boot software


Two native information-disclosure vulnerabilities have been recognized in fashionable Linux crash-reporting instruments, permitting attackers to entry delicate system knowledge.

The vulnerabilities, uncovered by the Qualys Risk Analysis Unit (TRU), affect Apport on Ubuntu and systemd-coredump on Purple Hat Enterprise Linux (RHEL) and Fedora.

CVE-2025-5054 targets Apport, Ubuntu’s crash-reporting framework, whereas CVE-2025-4598 impacts systemd-coredump, used on RHEL 9, RHEL 10 and Fedora 40/41. 

Each are race-condition flaws that allow native customers exploit SUID packages to learn core dumps from crashed processes.

In proof-of-concept demonstrations, TRU efficiently extracted password hashes from /and so forth/shadow by focusing on the unix_chkpwd utility, which is current by default on most Linux distributions.

“Crash handlers stay a hidden weak level in Linux hygiene,” stated Jason Soroko, senior fellow at Sectigo.

“The discoveries tracked as CVE-2025-5054 and CVE-2025-4598 expose how engineers have positioned legacy debug instruments inside trendy manufacturing photographs with out redesign.”

He added that, “Core dump helpers nonetheless inherit sufficient privilege to disclose all the shadow retailer. An area low-privilege consumer can look forward to any SUID course of to crash, then race the handler and loot hashes with out tripping community detection.”

Learn extra on Linux safety: New Linux Vulnerabilities Surge 967% in a 12 months

Core dumps retailer reminiscence snapshots of crashing functions, usually together with credentials or cryptographic keys.

Instruments like Apport and systemd-coredump have been designed for debugging however can inadvertently expose important knowledge if misconfigured or left unpatched.

Affected software program consists of:

  • Apport as much as model 2.33.0 on all Ubuntu releases since 16.04, together with 24.04

  • systemd-coredump on Fedora 40/41, RHEL 9 and RHEL 10

Debian methods should not affected by default, as they don’t pre-install systemd-coredump.

To cut back publicity, directors are suggested to:

  • Set /proc/sys/fs/suid_dumpable to 0 to disable core dumps for all SUID packages

  • Apply obtainable patches as quickly as potential

  • Tighten entry controls round core-dump dealing with utilities

“Defenders ought to start to deal with crash administration as a regulated knowledge pipeline as a substitute of a developer comfort,” Soroko stated.

“Encrypt reminiscence dumps in flight and at relaxation and implement speedy shredding as soon as triage ends. Strip SUID binaries of the flexibility to jot down dumps and confirm handler identification with strict PID checks. These modifications will find yourself costing little in contrast with a breach triggered by password hash theft.”

Tags: coreDumpsExposeHashesLinuxPasswordvulnerabilities
Previous Post

What You Have to Do After a Home Fireplace in Lake County

Next Post

Construct GraphRAG functions utilizing Amazon Bedrock Information Bases

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Navigating the labyrinth of forks
Cyber Security

Navigating the labyrinth of forks

by Md Sazzad Hossain
July 20, 2025
Welcoming Aura to Have I Been Pwned’s Associate Program
Cyber Security

Welcoming Aura to Have I Been Pwned’s Associate Program

by Md Sazzad Hossain
July 19, 2025
Risk actors scanning for apps incorporating weak Spring Boot software
Cyber Security

Risk actors scanning for apps incorporating weak Spring Boot software

by Md Sazzad Hossain
July 19, 2025
Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai – Krebs on Safety
Cyber Security

Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai – Krebs on Safety

by Md Sazzad Hossain
July 18, 2025
Cyber Security

Choo Choo Select to disregard the vulnerability • Graham Cluley

by Md Sazzad Hossain
July 18, 2025
Next Post
Construct GraphRAG functions utilizing Amazon Bedrock Information Bases

Construct GraphRAG functions utilizing Amazon Bedrock Information Bases

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Introduction to Snowflake – Dataquest

Introduction to Snowflake – Dataquest

June 20, 2025
Emotional Intelligence in AI: Understanding AI Girlfriend Chatbots

Emotional Intelligence in AI: Understanding AI Girlfriend Chatbots

May 9, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Evaluating IGP and BGP Information Middle Convergence « ipSpace.internet weblog

Cisco IOS/XE Hates Redistributed Static IPv6 Routes « ipSpace.internet weblog

July 20, 2025
DuckDuckGo låter användare filtrera AI-genererade bilder

DuckDuckGo låter användare filtrera AI-genererade bilder

July 20, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In