How to Protect Against systemd-coredump Vulnerability (CVE-2025-4598) with RLC-H
Overview¶
A critical vulnerability in systemd-coredump allows attackers with basic system access to extract sensitive data (such as password hashes and cryptographic keys) from crashed privileged programs within seconds.
- Enterprise Linux 9 (EL9) systems are vulnerable by default.
- EL7/8 systems are not affected in their default configurations.
- RLC-H (Rocky Linux from CIQ – Hardened) blocks this attack through multiple layers of defense.
Demonstrations show:
- Vanilla Rocky Linux 9.6 can be compromised in under 5 seconds.
- Weak passwords cracked immediately.
- RLC-H resists the attack by default.
Bottom line: This isn’t theoretical — it’s a working exploit against unpatched EL9 systems. RLC-H prevents it.
Introduction¶
Over two months after public disclosure of systemd-coredump CVE-2025-4598 by Qualys, the vulnerability remains unfixed in upstream Enterprise Linux. EL9 is fully exposed by default, while RLC-H has provided effective mitigations from the start.
Other vendors, such as Oracle, fixed the issue on disclosure. Qualys and Oracle described the vulnerability in detail, but here we demonstrate its severity through direct exploitation.
Background¶
When a program crashes, it may produce a core dump containing the program’s memory at the time of failure. Core dumps can include sensitive information.
While the Linux kernel normally prevents unsafe dumps, some distributions redirect core dumps to user-space processors like systemd-coredump. These processors have historically contained vulnerabilities (e.g., in Ubuntu’s apport
and Fedora/RHEL’s abrt
).
In 2022, systemd-coredump
added logic to duplicate the kernel’s protections. However, in 2025, Qualys found that this logic was vulnerable to a race condition involving PID reuse, leading to unsafe exposure of privileged data.
The Vulnerability¶
- When
systemd-coredump
saves dumps, it makes them readable to the crashing user. - Some executables run with SUID/SGID privileges or start as privileged daemons. These can retain sensitive data inaccessible to normal users.
- The kernel protects against unsafe dumps with a
dumpable
flag — but systemd-coredump did not always check this reliably. - Exploitation hinges on a race condition where PID reuse tricks
systemd-coredump
into exposing data from privileged processes.
Affected Systems¶
Vulnerability exists wherever:
systemd-coredump
is the configured core dump handler (kernel.core_pattern
)fs.suid_dumpable
is non-zero.
Info
- These conditions are true by default on Fedora, EL9, and EL10.
- They are not true by default on EL7 and EL8.
- Fedora issued a fix quickly; EL9 is left highly exposed.
Severity¶
Exploit probability is very high once attempted. Attack requires no special skill — just the ability to run code locally.
Consequences:
- Extraction of password hashes.
- Theft of cryptographic keys.
- Potential cracking of real user and root passwords.
Red Hat rated the CVE “Moderate,” but based on exploitability, the impact should be considered Important.
Exploitation¶
Exploitation is straightforward:
- Crash a program (e.g., send a signal).
- Force PID reuse (possible instantly via SUID helpers like
newgrp
). - Win the race reliably (exploit code tends to succeed almost immediately).
Results:
- On Rocky Linux 9.6, the exploit can dump password hashes (including root’s) in seconds.
- On RLC-H 9.6, the exploit fails by default thanks to hardened settings.
- If RLC-H mitigations are manually disabled (unsafe configuration), the exploit works similarly to vanilla EL9.
Defense in Depth with RLC-H¶
RLC-H blocks this exploit through multiple layers of defense:
- Safe core dump settings:
fs.suid_dumpable=0
by default prevents unsafe core dumps. - Restricted SUID programs: Access to dangerous helpers like
unix_chkpwd
andnewgrp
is limited. -
Stronger passwords by default:
passwdqc
enforces stricter password quality rules, rejecting weak or common passwords that EL9 would allow.yescrypt
replacessha512crypt
as the hashing algorithm, making any captured hashes far more resistant to cracking — even with GPUs.
These measures mean that even if attackers somehow extracted hashes, they would face significantly higher difficulty in turning them into real passwords.
Additionally:
- CIQ contributes these enhancements to the Rocky Linux community through SIG/Security.
- Linux Kernel Runtime Guard (LKRG), in paranoid mode, can fully block
systemd-coredump
(optional, not default). - CIQ is planning further improvements to
passwdqc
andyescrypt
.
Traditional Patching¶
CIQ also expects this CVE to be patched traditionally in upstream and Rocky Linux.
CIQ is delivering patches via its 9.x LTS products and the FastTrack repository for base RLC 9.
Summary¶
- EL9 is vulnerable by default — attackers can steal hashes/keys in seconds.
- Exploitation is real, fast, and trivial.
- RLC-H fully mitigates the vulnerability with layered protections.
- Organizations running EL9 should adopt RLC-H or apply upstream patches once available.
Bottom line: RLC-H customers are safe. Others remain at risk until patches arrive.
Related articles¶
The real danger of systemd-coredump CVE-2025-4598
CVE-2025-4598 Details