FERRAMENTAS LINUX: Critical Security Update: GNU TLS Patch Fixes CVE-2024-12243 Vulnerability

sábado, 7 de junho de 2025

Critical Security Update: GNU TLS Patch Fixes CVE-2024-12243 Vulnerability

 

SUSE

SUSE Linux releases a critical security update for GNU TLS (gnutls) patching CVE-2024-12243, a DoS vulnerability. Learn how to secure SUSE Enterprise 15 SP7 systems & prevent attacks. Includes patch commands & CVSS analysis.

Why This Update Matters for Enterprise Security

A newly released SUSE Linux security update addresses a moderate-risk vulnerability (CVE-2024-12243) in GNU TLS (gnutls), a critical encryption library used in enterprise environments. This flaw could expose systems to denial-of-service (DoS) attacks due to inefficient DER input decoding in libtasn1.

Affected Products:
✔ SUSE Linux Enterprise Desktop 15 SP7
✔ SUSE Linux Enterprise Server 15 SP7
✔ SUSE Linux Enterprise Real Time 15 SP7
✔ SUSE Linux Enterprise Server for SAP Applications 15 SP7
✔ Certifications Module 15-SP7

Key Security Risks & Mitigation

The vulnerability (CVSS: 5.3) allows attackers to exploit quadratic complexity in DER parsing, potentially causing CPU exhaustion. While it doesn’t enable remote code execution, unpatched systems may suffer performance degradation under attack.

Patch Instructions:

  • Use YaST online_update or run:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Module-Certifications-15-SP7-2025-764=1
  • Verify installation with:

    bash
    Copy
    Download
    zypper patches --cve CVE-2024-12243

Enterprise Impact & Best Practices

This update is critical for:

  • IT administrators managing Linux servers

  • DevOps teams using SUSE in cloud environments

  • Cybersecurity professionals ensuring compliance

For maximum protection:

  1. Apply patches immediately to avoid exploitation.

  2. Monitor network traffic for abnormal spikes.

  3. Review system logs for unexpected resource usage.

Additional Resources

🔗 SUSE Security Advisory
🔗 Bugzilla Report (bsc#1236974)


Nenhum comentário:

Postar um comentário