Linux Crash Report Vulnerabilities: A Comedy of Errors Exposing Sensitive Data

Local vulnerabilities in Linux crash-reporting tools Apport and systemd-coredump give attackers access to sensitive data. These race-condition flaws, identified by the Qualys Threat Research Unit, allow users to exploit SUID programs to extract password hashes. Administrators should patch these vulnerabilities promptly to prevent potential data breaches.

Pro Dashboard

Hot Take:

Looks like Linux’s crash-reporting tools are having a “whoopsie” moment, and unfortunately, it’s not the kind you can just laugh off. When your crash handlers are handing out password hashes like candy, it’s time to seriously reconsider your life choices—or at least your system configurations.

Key Points:

  • Two vulnerabilities target Apport on Ubuntu and systemd-coredump on RHEL and Fedora.
  • These are race-condition flaws that allow core dumps to be exploited to extract sensitive data.
  • Proof-of-concept showed password hashes could be accessed using the unix_chkpwd utility.
  • Affected systems include Apport up to version 2.33.0 on Ubuntu and systemd-coredump on Fedora and RHEL.
  • Administrators should disable core dumps, apply patches, and tighten access controls.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?