Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-4598
Modified
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-30 May, 2025 | 14:15
Updated At-02 Feb, 2026 | 10:16

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CPE Matches

systemd_project
systemd_project
>>systemd>>Versions before 252.37(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
systemd_project
systemd_project
>>systemd>>Versions from 253(inclusive) to 253.32(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
systemd_project
systemd_project
>>systemd>>Versions from 254(inclusive) to 254.25(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
systemd_project
systemd_project
>>systemd>>Versions from 255(inclusive) to 255.19(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
systemd_project
systemd_project
>>systemd>>Versions from 256(inclusive) to 256.14(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
systemd_project
systemd_project
>>systemd>>Versions from 257(inclusive) to 257.6(exclusive)
cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>openshift_container_platform>>4.0
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>7.0
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>8.0
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>9.0
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux>>10.0
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>11.0
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>12.0
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>linux>>8
cpe:2.3:o:oracle:linux:8:-:*:*:*:*:*:*
Oracle Corporation
oracle
>>linux>>9
cpe:2.3:o:oracle:linux:9:-:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 6.16(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-364Secondarysecalert@redhat.com
CWE ID: CWE-364
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:22660secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:22868secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23227secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:23234secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:0414secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2026:1652secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2025-4598secalert@redhat.com
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2369242secalert@redhat.com
Issue Tracking
https://www.openwall.com/lists/oss-security/2025/05/29/3secalert@redhat.com
Mailing List
http://seclists.org/fulldisclosure/2025/Jun/9af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2025/06/05/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2025/06/05/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2025/08/18/3af854a3a-2127-422b-91ae-364da2661108
N/A
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2025/07/msg00022.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.openwall.com/lists/oss-security/2025/08/18/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22660
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:22868
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23227
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:23234
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:0414
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2026:1652
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-4598
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2369242
Source: secalert@redhat.com
Resource:
Issue Tracking
Hyperlink: https://www.openwall.com/lists/oss-security/2025/05/29/3
Source: secalert@redhat.com
Resource:
Mailing List
Hyperlink: http://seclists.org/fulldisclosure/2025/Jun/9
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2025/06/05/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2025/06/05/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2025/08/18/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/07/msg00022.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.openwall.com/lists/oss-security/2025/08/18/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Change History
0Changes found

Details not found