Linux.Slashdot.org

Slashdot: Linux
News for nerds, stuff that matters
Updated: 3 hours 32 min ago

Linux User Share Hits a Multi-Year High On Steam For May 2025

Mon, 06/02/2025 - 17:00
Linux user share on Steam rose to 2.69% in May 2025 -- the highest level recorded since at least 2018. GamingOnLinux reports: Overall user share for May 2025: - Windows 95.45% -0.65% - Linux 2.69% +0.42% - macOS 1.85% +0.23% Even with SteamOS 3 now being a little more widely available, the rise was not from SteamOS directly. Filtering to just the Linux numbers gives us these most popular distributions: - SteamOS Holo 64 bit 30.95% -2.83% - Arch Linux 64 bit 10.09% +0.64% - Linux Mint 22.1 64 bit 7.76% +1.56% - Freedesktop SDK 24.08 (Flatpak runtime) 64 bit 7.42% +1.01% - Ubuntu Core 22 64 bit 4.63% +0.01% - Ubuntu 24.04.2 LTS 64 bit 4.30% -0.14% - CachyOS 64 bit 2.54% +2.54% - EndeavourOS Linux 64 bit 2.44% -0.02% - Manjaro Linux 64 bit 2.43% -0.18% - Pop!_OS 22.04 LTS 64 bit 2.17% -0.06% - Debian GNU/Linux 12 (bookworm) 64 bit 1.99% -0.28% - Other 23.27% -2.27%

Read more of this story at Slashdot.

Categories: Linux

New Moderate Linux Flaw Allows Password Hash Theft Via Core Dumps in Ubuntu, RHEL, Fedora

Sun, 06/01/2025 - 23:34
An anonymous reader shared this report from The Hacker News: Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like Apport and systemd-coredump are designed to handle crash reporting and core dumps in Linux systems. "These race conditions allow a local attacker to exploit a SUID program and gain read access to the resulting core dump," Saeed Abbasi, manager of product at Qualys TRU, said... Red Hat said CVE-2025-4598 has been rated Moderate in severity owing to the high complexity in pulling an exploit for the vulnerability, noting that the attacker has to first win the race condition and be in possession of an unprivileged local account... Qualys has also developed proof-of-concept code for both vulnerabilities, demonstrating how a local attacker can exploit the coredump of a crashed unix_chkpwd process, which is used to verify the validity of a user's password, to obtain password hashes from the /etc/shadow file. Advisories were also issued by Gentoo, Amazon Linux, and Debian, the article points out. (Though "It's worth noting that Debian systems aren't susceptible to CVE-2025-4598 by default, since they don't include any core dump handler unless the systemd-coredump package is manually installed.") Canonical software security engineer Octavio Galland explains the issue on Canonical's blog. "If a local attacker manages to induce a crash in a privileged process and quickly replaces it with another one with the same process ID that resides inside a mount and pid namespace, apport will attempt to forward the core dump (which might contain sensitive information belonging to the original, privileged process) into the namespace... In order to successfully carry out the exploit, an attacker must have permissions to create user, mount and pid namespaces with full capabilities." Canonical's security team has released updates for the apport package for all affected Ubuntu releases... We recommend you upgrade all packages... The unattended-upgrades feature is enabled by default for Ubuntu 16.04 LTS onwards. This service: - Applies new security updates every 24 hours automatically. - If you have this enabled, the patches above will be automatically applied within 24 hours of being available.

Read more of this story at Slashdot.

Categories: Linux
Comment