A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.

A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4259-1 systemd security update
Debian DSA Debian DSA DSA-5931-1 systemd security update
EUVD EUVD EUVD-2025-16486 A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Ubuntu USN Ubuntu USN USN-7559-1 systemd vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

This issue can be mitigated by disabling the capability of the system to generate a coredump for SUID binaries. The perform that, the following command can be ran as `root` user: ~~~ echo 0 > /proc/sys/fs/suid_dumpable ~~~ While this mitigates this vulnerability while it's not possible to update the systemd package, it disables the capability of analyzing crashes for such binaries.

History

Wed, 14 Jan 2026 07:30:00 +0900

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/a:redhat:discovery:2::el9
Vendors & Products Redhat discovery
References

Tue, 16 Dec 2025 18:45:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:ceph_storage:8::el9
References

Tue, 16 Dec 2025 10:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat ceph Storage
CPEs cpe:/a:redhat:ceph_storage:7::el9
Vendors & Products Redhat ceph Storage
References

Tue, 09 Dec 2025 03:30:00 +0900

Type Values Removed Values Added
First Time appeared Redhat insights Proxy
CPEs cpe:/a:redhat:insights_proxy:1.5::el9
Vendors & Products Redhat insights Proxy
References

Wed, 03 Dec 2025 21:00:00 +0900

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/o:redhat:enterprise_linux:9::baseos
References

Wed, 05 Nov 2025 07:30:00 +0900

Type Values Removed Values Added
References

Tue, 04 Nov 2025 05:30:00 +0900


Thu, 09 Oct 2025 01:15:00 +0900

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Mon, 06 Oct 2025 23:15:00 +0900

Type Values Removed Values Added
First Time appeared Redhat rhivos
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Thu, 28 Aug 2025 02:30:00 +0900

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
Linux
Linux linux Kernel
Oracle
Oracle linux
Systemd Project
Systemd Project systemd
CPEs cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:9:-:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux
Linux
Linux linux Kernel
Oracle
Oracle linux
Systemd Project
Systemd Project systemd

Tue, 19 Aug 2025 01:30:00 +0900


Wed, 13 Aug 2025 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Redhat openshift Container Platform
CPEs cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Redhat openshift Container Platform

Thu, 05 Jun 2025 16:45:00 +0900

Type Values Removed Values Added
References

Thu, 05 Jun 2025 12:45:00 +0900

Type Values Removed Values Added
References

Sat, 31 May 2025 06:45:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 30 May 2025 23:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 30 May 2025 22:30:00 +0900

Type Values Removed Values Added
Description A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
Title Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-364
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-13T22:07:58.522Z

Reserved: 2025-05-12T16:33:34.815Z

Link: CVE-2025-4598

cve-icon Vulnrichment

Updated: 2025-11-04T21:10:46.971Z

cve-icon NVD

Status : Modified

Published: 2025-05-30T14:15:23.557

Modified: 2026-01-13T23:16:03.237

Link: CVE-2025-4598

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-29T00:00:00Z

Links: CVE-2025-4598 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses