FERRAMENTAS LINUX: Critical Yelp Security Update: CVE-2025-3155 Patch Now Available

segunda-feira, 30 de junho de 2025

Critical Yelp Security Update: CVE-2025-3155 Patch Now Available

 

SUSE

SUSE has released a critical security update for Yelp (CVE-2025-3155) addressing JavaScript execution & arbitrary file read vulnerabilities. Learn patch instructions for openSUSE Leap 15.6, SLE 15 SP6/7, and Desktop Modules.

Why This Update Matters

A newly discovered vulnerability (CVE-2025-3155) in Yelp’s help file parser could allow attackers to:

  • Execute malicious JavaScript via crafted ghelp: scheme URLs.

  • Read arbitrary local files (CVSS 7.4 NVD / 6.9 SUSE).
    Affected systems include SUSE Linux Enterprise 15 SP6/7openSUSE Leap 15.6, and related Desktop/Server modules.

Pro Tip: Enterprise users should prioritize patching—this exploit requires no privileges (PR:N) and works remotely (AV:N).


Patch Instructions (Step-by-Step)

1. Recommended Methods

  • YaST Online Update: Automated patches via SUSE’s tool.

  • Zypper Patch: Terminal command for granular control.

2. Product-Specific Commands

ProductInstall Command
openSUSE Leap 15.6zypper in -t patch SUSE-2025-2170=1 openSUSE-SLE-15.6-2025-2170=1
Desktop Apps 15-SP6zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2170=1
SLE Server 15 SP7zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2170=1

Technical Deep Dive: CVE-2025-3155

  • CVSS 4.0: 6.9 (SUSE) – High Confidentiality (VC:H), User Interaction Required (UI:A).

  • Exploit Flow: Malicious help file → JavaScript execution → File system access.

  • Mitigation: Patch blocks ghelp: URL parsing exploits.

Affected Packages:

  • yelp-42.2libyelp0, debug/devel packages (see full list).


FAQs

Q: Is this vulnerability actively exploited?

A: No public exploits yet, but PoCs are likely due to low attack complexity (AC:L).

Q: Can I mitigate without patching?

A: Disable Yelp/help file processing in enterprise policies (temporary fix).

Nenhum comentário:

Postar um comentário