Home » New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

by Lila Hernandez
2 minutes read

In a recent discovery by the Qualys Threat Research Unit (TRU), two critical information disclosure vulnerabilities have been unearthed in apport and systemd-coredump, the core dump handlers utilized in Ubuntu, Red Hat Enterprise Linux (RHEL), and Fedora operating systems. Identified as CVE-2025-5054 and CVE-2025-4598, these vulnerabilities pose a significant threat as they are race condition bugs that could potentially allow a local attacker to gain access to sensitive information, particularly password hashes, through core dumps.

Core dumps are essential for diagnosing system issues as they capture the memory state of a program when it crashes. However, in the case of these vulnerabilities, core dumps can inadvertently expose critical data, such as password hashes, which are used to authenticate users on the system. With access to password hashes, attackers can launch sophisticated password cracking attacks, compromising the security of the entire system.

The exploitation of these vulnerabilities highlights the importance of promptly addressing security flaws in core dump handling mechanisms. Without swift action, attackers could exploit these weaknesses to gain unauthorized access to sensitive information, potentially leading to severe security breaches and data exfiltration.

Organizations using Ubuntu, RHEL, or Fedora are strongly advised to update their systems with the latest security patches provided by the respective vendors. By applying these patches, users can mitigate the risk posed by CVE-2025-5054 and CVE-2025-4598, safeguarding their systems against potential attacks aimed at stealing password hashes via core dumps.

Furthermore, system administrators should implement additional security measures, such as restricting access to core dump files and regularly monitoring system logs for any suspicious activities. Proactive security practices play a crucial role in fortifying systems against evolving cyber threats and ensuring the confidentiality and integrity of sensitive data.

As the cybersecurity landscape continues to evolve, staying informed about the latest vulnerabilities and security best practices is paramount for IT and development professionals. By remaining vigilant and proactive in addressing security risks, organizations can enhance their overall cybersecurity posture and effectively protect their systems and data from malicious actors.

In conclusion, the discovery of vulnerabilities in core dump handlers in Ubuntu, RHEL, and Fedora serves as a stark reminder of the importance of prioritizing system security and promptly addressing potential security flaws. By taking proactive steps to secure systems, organizations can mitigate risks, protect sensitive information, and uphold the integrity of their IT infrastructure in the face of emerging cyber threats.

You may also like