FERRAMENTAS LINUX: Critical Security Update: openSUSE Patches Python3-setuptools Vulnerability (CVE-2025-47273)

quarta-feira, 4 de junho de 2025

Critical Security Update: openSUSE Patches Python3-setuptools Vulnerability (CVE-2025-47273)

 

openSUSE


openSUSE releases critical patch for python3-setuptools (CVE-2025-47273) fixing arbitrary file write risks. Learn how to secure SUSE Linux Enterprise, openSUSE Leap, and HPC systems now with step-by-step update instructions.


Overview: High-Risk Arbitrary File Write Flaw Fixed

openSUSE has released an important security update for python3-setuptools addressing CVE-2025-47273, a severe path traversal vulnerability that could allow attackers to execute arbitrary file writes on affected systems. This flaw, tracked under bsc#1243313, impacts multiple SUSE Linux Enterprise and openSUSE Leap distributions.

Why This Update Matters

  • Critical Severity: Exploiting this flaw could lead to unauthorized system modifications or malware deployment.

  • Widespread Impact: Affects SUSE Linux Enterprise Server, SAP Applications, HPC, and openSUSE Leap deployments.

  • Enterprise Risk: Systems running SUSE Manager, Micro for Rancher, and Retail Branch Servers are vulnerable if unpatched.


Patch Instructions: How to Secure Your System

To mitigate this vulnerability, apply the latest updates using one of the following methods:

Recommended Update Methods

✔ YaST Online Update (GUI)
✔ Command Line (zypper)

Specific Patch Commands by Product

ProductPatch Command
SUSE Linux Enterprise Server 15 SP4/SP5zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1810=1
openSUSE Leap 15.6zypper in -t patch openSUSE-SLE-15.6-2025-1810=1
SUSE Manager Server 4.3zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1810=1
Full list of affected productsSee official SUSE advisory (hypothetical link)

Technical Details: Understanding CVE-2025-47273

The vulnerability exists in PackageIndex.download, where improper path validation enables:

  • Directory Traversal Attacks: Malicious packages could overwrite system files.

  • Privilege Escalation: If exploited, attackers gain elevated access.

Affected Package Versions

  • python3-setuptools-44.1.1-150400.9.12.1 (and related wheel/test packages)


Additional References & Next Steps

🔗 Official CVE DetailsSUSE Security Advisory
🔗 Bug ReportBugzilla #1243313

FAQs

Q: Is this vulnerability actively exploited?

A: No known exploits yet, but patch immediately due to high severity.

Q: Does this impact non-SUSE distributions?

A: Only if using SUSE’s python3-setuptools backports.

Nenhum comentário:

Postar um comentário