<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>cve.2025-5054 on Detection.FYI</title>
    <link>https://detection.fyi/tags/cve.2025-5054/</link>
    <description>Recent content in cve.2025-5054 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/cve.2025-5054/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Potential Exploitation of CVE-2025-5054 or CVE-2025-4598</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/proc_creation_lnx_exploit_cve_2025_5054_or_cve_2025_4598/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2025/exploits/cve_2025_4598/proc_creation_lnx_exploit_cve_2025_5054_or_cve_2025_4598/</guid>
      <description>
        
          
            Detects attempts of an attacker to enable core dumps for set-user-ID (SUID) processes by modifying the system file /proc/sys/fs/suid_dumpable, typically by setting its value to 1 or 2.
Enabling this feature allows memory dumps (core dumps) of SUID processes, which usually run with elevated privileges.
These dumps may contain sensitive information such as passwords, cryptographic keys or other secrets.
CVE-2025-5054: Information leak via core dumps from SUID binaries using apport.
CVE-2025-4598: Information disclosure in systemd-coredump due to insecure handling of SUID process memory dumps.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
