FERRAMENTAS LINUX: Critical Security Update for iputils: CVE-2025-48964 Patch Guide

segunda-feira, 21 de julho de 2025

Critical Security Update for iputils: CVE-2025-48964 Patch Guide

 

SUSE

SUSE has released a moderate-risk security update for iputils (CVE-2025-48964) fixing an integer overflow vulnerability in ping statistics. Affected systems include SUSE Linux Enterprise 15 SP6/SP7, openSUSE Leap 15.4, and Micro/Rancher deployments. Learn patch instructions, CVSS scores, and mitigation steps.


🔍 Vulnerability Overview

A newly patched integer overflow flaw (CVE-2025-48964) in iputils could allow attackers to manipulate ping statistics via zero timestamps, potentially leading to denial-of-service (DoS) or data corruption.

Key Details:

  • CVSS 4.0 Score: 5.3 (Medium Severity)

  • CVSS 3.1 Score: 5.4 (Medium Severity)

  • Affected Products:

    • SUSE Linux Enterprise Server 15 SP6/SP7

    • openSUSE Leap 15.4

    • SUSE Linux Enterprise Micro 5.3/5.4

    • SUSE Real Time & SAP Applications


🛡️ Patch Instructions (Step-by-Step)

1. Recommended Update Methods

  • YaST Online Update (GUI)

  • Zypper Patch (CLI)

2. Terminal Commands for Each OS

bash
# openSUSE Leap 15.4  
zypper in -t patch SUSE-2025-2431=1  

# SUSE Linux Enterprise Micro 5.3  
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2431=1  

# SUSE Linux Enterprise Server 15 SP6  
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-2431=1  

(Full command list in original bulletin)


📌 Why This Update Matters

This patch addresses:
✅ CVE-2025-48964 – Exploitable via maliciously crafted ICMP packets.

✅ Bug #1243772 – Stability risks in network diagnostics.

Enterprise Impact:

  • DoS risks in high-availability environments.

  • Compliance implications for regulated industries (e.g., finance, healthcare).


🔗 Additional Resources


💬 FAQ

Q: Is this vulnerability actively exploited?

A: No known exploits yet, but patch immediately due to moderate CVSS scores.

Q: Can I verify if my system is patched?

A: Run rpm -q iputils and match the version to the updated package list.

Nenhum comentário:

Postar um comentário