<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVE_2025_4598 on Detection.FYI</title>
    <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/</link>
    <description>Recent content in CVE_2025_4598 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Potential Exploitation of CVE-2025-5054 or CVE-2025-4598</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/proc_creation_lnx_exploit_cve_2025_5054_or_cve_2025_4598/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/proc_creation_lnx_exploit_cve_2025_5054_or_cve_2025_4598/</guid>
      <description>
        
          
            Detects attempts of an attacker to enable core dumps for set-user-ID (SUID) processes by modifying the system file /proc/sys/fs/suid_dumpable, typically by setting its value to 1 or 2.
Enabling this feature allows memory dumps (core dumps) of SUID processes, which usually run with elevated privileges.
These dumps may contain sensitive information such as passwords, cryptographic keys or other secrets.
CVE-2025-5054: Information leak via core dumps from SUID binaries using apport.
CVE-2025-4598: Information disclosure in systemd-coredump due to insecure handling of SUID process memory dumps.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
