Linux Crash Course: When Core Dumps Spill the Beans!

Apport and systemd-coredump have been found with two race condition vulnerabilities, CVE-2025-5054 and CVE-2025-4598, allowing local attackers to access sensitive data. These flaws could lead to unintended data leaks, but fear not—disabling core dumps for SUID binaries is one way to prevent your secrets from spilling out!

Pro Dashboard

Hot Take:

Looks like Linux systems have caught the race condition bug again, and this time it’s not an Olympic event. But fear not, for Qualys TRU is here to save the day with a couple of fancy CVEs and some solid advice. So, if you’re running Ubuntu, Red Hat, or Fedora, it might be time to give your core dumps a little privacy makeover before they spill the beans!

Key Points:

  • Two vulnerabilities, CVE-2025-5054 and CVE-2025-4598, identified in Linux core dump handlers.
  • Both are race condition bugs affecting Apport and systemd-coredump, potentially leaking sensitive information.
  • The vulnerabilities are rated with a CVSS score of 4.7, indicating moderate severity.
  • Mitigation involves disabling core dumps for SUID binaries to reduce risk.
  • Debian systems are not affected by default, and Ubuntu releases dodged CVE-2025-4598 entirely.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?