Linux Crash Course: When Core Dumps Spill the Beans!
Apport and systemd-coredump have been found with two race condition vulnerabilities, CVE-2025-5054 and CVE-2025-4598, allowing local attackers to access sensitive data. These flaws could lead to unintended data leaks, but fear not—disabling core dumps for SUID binaries is one way to prevent your secrets from spilling out!

Hot Take:
Looks like Linux systems have caught the race condition bug again, and this time it’s not an Olympic event. But fear not, for Qualys TRU is here to save the day with a couple of fancy CVEs and some solid advice. So, if you’re running Ubuntu, Red Hat, or Fedora, it might be time to give your core dumps a little privacy makeover before they spill the beans!
Key Points:
- Two vulnerabilities, CVE-2025-5054 and CVE-2025-4598, identified in Linux core dump handlers.
- Both are race condition bugs affecting Apport and systemd-coredump, potentially leaking sensitive information.
- The vulnerabilities are rated with a CVSS score of 4.7, indicating moderate severity.
- Mitigation involves disabling core dumps for SUID binaries to reduce risk.
- Debian systems are not affected by default, and Ubuntu releases dodged CVE-2025-4598 entirely.
Already a member? Log in here