FERRAMENTAS LINUX: Critical Security Update: Go 1.22 OpenSSL Patches 3 Vulnerabilities (CVE-2024-45336, CVE-2024-45341, CVE-2025-22866)

quinta-feira, 15 de maio de 2025

Critical Security Update: Go 1.22 OpenSSL Patches 3 Vulnerabilities (CVE-2024-45336, CVE-2024-45341, CVE-2025-22866)

 

SUSE

SUSE releases critical Go 1.22 OpenSSL security update patching CVE-2024-45336 (HTTP header leak), CVE-2024-45341 (certificate bypass), and CVE-2025-22866 (crypto timing attack). Learn patch commands for SUSE Linux Enterprise, HPC, and SAP systems.

SUSE has released a high-priority security update for go1.22-openssl, addressing three critical vulnerabilities that could expose systems to data leaks, bypassed security constraints, and variable-time cryptographic attacks. Enterprises relying on SUSE Linux distributions must apply this patch immediately to mitigate risks.


Key Security Fixes in Go 1.22.12

This update resolves the following CVEs (Common Vulnerabilities and Exposures):

  1. CVE-2024-45336 (CVSS 6.1)

    • Risk: Sensitive HTTP headers sent after cross-domain redirects

    • Impact: Potential session hijacking or credential leakage

    • Affected: net/http package

  2. CVE-2024-45341 (CVSS 6.1)

    • Risk: IPv6 zone IDs bypass URI name constraints in crypto/x509

    • Impact: Man-in-the-middle (MITM) attacks or certificate spoofing

  3. CVE-2025-22866 (CVSS 6.0)

    • Risk: Variable-time execution in p256NegCond (PPC64LE architecture)

    • Impact: Side-channel attacks compromising ECC cryptographic operations

🔹 Additional Fixes:

  • 1 feature enhancement (undisclosed)

  • 1 security hardening patch


Affected SUSE Products

This update applies to:
✔ SUSE Linux Enterprise Server (15 SP3-SP5)
✔ SUSE High Performance Computing (HPC) 15 SP3-SP5
✔ SUSE Enterprise Storage 7.1
✔ SUSE Linux Enterprise for SAP Applications (15 SP3-SP5)

📌 Long-Term Support (LTSS) & Extended Support (ESPOS) versions included.


How to Install the Security Patch

Recommended Methods

  • YaST Online Update (GUI)

  • Command Line:


bash
Copy
Download
zypper patch

Manual Patch Commands (Per Distribution)

ProductInstall Command
SUSE Linux Enterprise Server 15 SP5zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1555=1
SUSE HPC 15 SP4zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1555=1
SUSE SAP Applications 15 SP5zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1555=1

(Full command list available in SUSE Security Advisory SU-2025:1555-1)


Why This Update Matters for Enterprises

🚨 Unpatched systems risk:

  • Data breaches via HTTP header leaks

  • Bypassed TLS/SSL certificate checks

  • Cryptographic timing attacks on financial/healthcare systems

💡 Best Practices:

  • Schedule immediate patching for production servers.

  • Audit Go-based microservices for exposure.

  • Monitor NVD updates for emerging threats.


Additional References

🔗 CVE Details:

📜 Bug Reports:


FAQ

❓ Is this update backward compatible?

✅ Yes—no breaking changes reported.

❓ Does this affect non-SUSE Linux distributions?

⚠️ Potentially, if using Go 1.22 with OpenSSL. Check upstream advisories.

❔ How urgent is deployment?

⏱ Moderate urgency—exploits require specific conditions but pose enterprise risks.

Nenhum comentário:

Postar um comentário