macOS xterm-256color bash 144 views

Proof-of-concept demonstration of a CVE exploit that dumps password hashes from /etc/shadow by leveraging a PID reuse race condition in systemd-coredump along with SUID root programs like unix_chkpwd. The attack succeeds within seconds on vanilla Rocky Linux 9.6, automatically dumping both user and root password hashes. On RLC-H 9.6, the exploit consistently fails due to built-in security mitigations, specifically a safer fs.suid_dumpable default and restricted SUID program access, demonstrating how RLC-H’s hardening protects against real-world attacks