New Linux Vulnerabilities Put Millions of Password Hashes at Risk
Two critical local information-disclosure vulnerabilities have been uncovered, affecting millions of Linux systems worldwide. These flaws could allow attackers to extract sensitive password data through manipulated core dumps—posing a serious security risk to enterprises and individuals alike.
The Discovery
The vulnerabilities, disclosed by the Qualys Threat Research Unit (TRU), target core dump handlers used in major Linux distributions. They involve race conditions that can be exploited to access core dumps generated by SUID (Set User ID) programs—a class of privileged executables.
-
CVE-2025-5054 targets Apport, Ubuntu’s crash reporting system.
-
CVE-2025-4598 affects systemd-coredump, the default handler in Red Hat Enterprise Linux (RHEL) 9 & 10 and Fedora 40/41.
Qualys researchers demonstrated successful proof-of-concept (PoC) exploits that allow attackers to manipulate processes like unix_chkpwd
—a standard Linux utility for password verification—and extract password hashes directly from the core dumps.
Why Core Dumps Are a Target
Core dumps are memory snapshots generated when a program crashes, often containing valuable debugging information. Unfortunately, that can also include sensitive data like:
-
Password hashes
-
Encryption keys
-
Internal service tokens
-
Customer or user data
While Linux systems typically restrict access to these dumps—storing them in protected directories or limiting access to root users—these vulnerabilities bypass those protections by exploiting timing-based flaws in how core dumps are generated and handled.
Who Is Affected?
The vulnerabilities impact:
-
All Ubuntu versions from 16.04 through 24.04 via Apport (up to version 2.33.0)
-
Red Hat Enterprise Linux 9 & 10 and Fedora 40/41 via systemd-coredump
Notably, Debian systems are not affected by default, as they do not include a core dump handler unless one is explicitly installed.
Potential Impact
The risks posed by these vulnerabilities are severe:
-
Password hash exposure can lead to offline cracking and credential theft.
-
Privilege escalation and lateral movement become feasible for attackers within a network.
-
Compliance violations, reputational damage, and downtime are likely for affected organizations.
Mitigation and Recommendations
Security experts strongly recommend implementing an immediate workaround:
Set the
/proc/sys/fs/suid_dumpable
parameter to0
This disables core dumps for all SUID programs, effectively blocking the attack vector.
While this step will disable some debugging capabilities, it serves as a crucial stopgap until official patches are released. Additionally, Qualys has released tested mitigation scripts to help organizations implement this change safely. However, administrators should test these scripts in staging environments to prevent unintended disruptions.
Key Takeaways
-
Two high-risk Linux vulnerabilities (CVE-2025-5054 and CVE-2025-4598) expose core dump data.
-
Millions of systems using Ubuntu, Fedora, and RHEL are at risk.
-
Exploitation allows attackers to extract password hashes and other sensitive memory content.
-
Immediate mitigations are available—but patches should be applied as soon as vendors release them.
This incident highlights the ongoing need for proactive vulnerability management, especially for foundational system components like crash handlers. Organizations should closely monitor their distributions for patch releases and prioritize mitigations to reduce exposure.
Comments
Post a Comment