FERRAMENTAS LINUX: Critical Security Update for Python-Setuptools: CVE-2025-47273 Patch Guide

sábado, 24 de maio de 2025

Critical Security Update for Python-Setuptools: CVE-2025-47273 Patch Guide

 

SUSE

Urgent security update for Python-Setuptools (CVE-2025-47273) affecting SUSE Linux Enterprise. Learn how to patch this high-risk vulnerability (CVSS 7.7) and protect your systems from arbitrary file write exploits.

High-Severity Vulnerability Patched in Python-Setuptools

A critical path traversal vulnerability (CVE-2025-47273) has been discovered in Python-Setuptools, posing a significant risk to SUSE Linux Enterprise users. 

Rated 7.7 (CVSS v4.0), this flaw allows attackers to execute arbitrary file writes via PackageIndex.download, potentially leading to system compromise, data breaches, or supply chain attacks.

Affected Products

This security update impacts multiple SUSE Linux Enterprise distributions, including:

  • SUSE Linux Enterprise Server 12 SP1-SP5

  • SUSE Linux Enterprise High Performance Computing (HPC) 12 SP2-SP5

  • SUSE Linux Enterprise Server for SAP Applications 12 SP1-SP5

  • Public Cloud Module 12

🚨 Immediate action required: Unpatched systems are vulnerable to remote exploitation (AV:N/AC:L) with no user interaction needed (UI:N).


Patch Instructions & Mitigation Steps

How to Apply the Update

To secure your systems, apply the patch using one of these methods:

✔ Recommended: Use YaST Online Update or zypper patch
✔ Manual installation (per product):

ProductPatch Command
Public Cloud Module 12zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-1695=1
SUSE Linux Enterprise Server 12 SP5 LTSSzypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1695=1
Extended Security (LTSS)zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1695=1

Updated Package Versions

  • python-setuptools-40.6.2-4.27.1

  • python3-setuptools-40.6.2-4.27.1


Why This Update Matters for Enterprises

🔹 High-Risk Exploit: Attackers can overwrite critical system files without authentication.

🔹 Supply Chain Threat: Malicious packages could abuse this flaw in dependency installations.

🔹 Compliance Impact: Unpatched systems may violate CIS benchmarks, GDPR, or NIST SP 800-53.

💡 Pro Tip: Combine this patch with SUSE Manager for automated vulnerability remediation across large deployments.


Additional Resources & References

📌 SUSE Security Advisory (CVE-2025-47273)
📌 Bugzilla Report (bsc#1243313)


FAQ: Python-Setuptools Security Update

❓ Is this vulnerability being actively exploited?

A: No confirmed exploits yet, but due to its low attack complexity, patches should be prioritized.

❓ Does this affect non-SUSE distributions?

A: The flaw exists in upstream Setuptools, but SUSE has confirmed impact on their specific builds.

❓ Can I verify if my system is vulnerable?

A: *Run rpm -q python-setuptools and check if the version is below 40.6.2-4.27.1.*

Nenhum comentário:

Postar um comentário