New Linux Vulnerabilities Expose Password Hashes via Core Dumps in Ubuntu, RHEL, and Fedora

Recent discoveries have unveiled two significant information disclosure vulnerabilities within the core dump handling mechanisms of several prominent Linux distributions, including Ubuntu, Red Hat Enterprise Linux (RHEL), and Fedora. These flaws, identified in the ‘apport’ and ‘systemd-coredump’ utilities, could potentially allow local attackers to access sensitive information, notably password hashes.

Understanding Core Dumps and Their Role in Linux Systems

Core dumps are files that capture the memory contents of a program at the moment it crashes. They are instrumental for developers and system administrators in diagnosing and debugging application failures. In Linux environments, tools like ‘apport’ and ‘systemd-coredump’ manage these core dumps, facilitating efficient crash reporting and analysis.

Details of the Vulnerabilities

The vulnerabilities, designated as CVE-2025-5054 and CVE-2025-4598, are both race condition bugs that can be exploited by local attackers to gain unauthorized access to core dumps of privileged processes.

– CVE-2025-5054: This flaw resides in the ‘apport’ package up to version 2.32.0. It involves a race condition that allows a local attacker to leak sensitive information through process ID (PID) reuse by leveraging namespaces. By inducing a crash in a privileged process and swiftly replacing it with another process bearing the same PID within a different namespace, an attacker can trick ‘apport’ into forwarding the core dump, potentially exposing sensitive data from the original process.

– CVE-2025-4598: Found in ‘systemd-coredump’, this vulnerability also stems from a race condition. An attacker can force a Set User ID (SUID) process to crash and then replace it with a non-SUID binary. This manipulation allows the attacker to access the core dump of the original privileged process, potentially revealing sensitive information such as the contents of the ‘/etc/shadow’ file, which stores password hashes.

Implications of the Vulnerabilities

The exploitation of these vulnerabilities poses significant security risks:

– Unauthorized Access to Sensitive Data: Attackers can retrieve password hashes and other confidential information from core dumps, potentially leading to unauthorized system access.

– Elevation of Privileges: By accessing core dumps of privileged processes, attackers may find avenues to escalate their privileges within the system.

– System Integrity Compromise: The ability to manipulate core dump handling processes undermines the reliability and security of the affected Linux distributions.

Mitigation Strategies

To address these vulnerabilities, system administrators and users are advised to implement the following measures:

1. Apply Security Updates: Ensure that all systems are updated with the latest patches provided by the respective Linux distribution maintainers.

2. Disable Core Dumps for SUID Programs: As a temporary mitigation, execute the command `echo 0 > /proc/sys/fs/suid_dumpable` as the root user. This action disables the generation of core dumps for SUID binaries, preventing potential exploitation. However, be aware that this will also disable the capability to analyze crashes for such binaries.

3. Monitor System Logs: Regularly review system logs for unusual activities, such as unexpected crashes or the presence of unauthorized processes, which may indicate exploitation attempts.

4. Restrict Namespace Usage: Limit the use of namespaces by unprivileged users to reduce the risk of exploitation through PID reuse techniques.

Conclusion

The identification of CVE-2025-5054 and CVE-2025-4598 underscores the critical importance of robust security practices in Linux systems. By promptly applying updates, implementing recommended mitigations, and maintaining vigilant monitoring, organizations can safeguard their systems against potential exploits targeting these vulnerabilities.