SUSE releases a critical security update for iputils (CVE-2025-48964) patching an integer overflow in ping statistics. Affects openSUSE Leap, SLE 15 SP6/SP7, and more. Learn patch instructions, CVSS scores, and enterprise risks.
SUSE Releases Moderate-Risk Fix for Integer Overflow in Ping Statistics
Published: July 21, 2025
Last Updated: July 22, 2025
Author: Linux Security Team
Overview of the Vulnerability
SUSE has released a critical security update for iputils, addressing CVE-2025-48964, a moderate-risk vulnerability affecting multiple Linux distributions. This flaw, an integer overflow in ping statistics via zero timestamp, could allow attackers to manipulate network diagnostics, potentially leading to denial-of-service (DoS) or data corruption.
Affected Systems
The following SUSE-based platforms require immediate patching:
openSUSE Leap 15.5, 15.6
SUSE Linux Enterprise Server 15 SP6/SP7
SUSE Linux Enterprise Desktop 15 SP6/SP7
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Real Time 15 SP6/SP7
Basesystem Module 15-SP6/SP7
Technical Details & Risk Assessment
CVE-2025-48964 Explained
CVSS v4.0 Score: 5.3 (Moderate)
CVSS v3.1 Score: 5.4 (Moderate)
Attack Vector: Network (AV:N)
Impact: Low integrity/availability impact (VI:L/VA:L)
This vulnerability stems from improper handling of timestamp calculations in the ping utility, which could be exploited to trigger incorrect statistical reporting or crashes.
Why This Matters for Enterprises
Network Monitoring Risks: Corrupted ping data could mislead administrators during diagnostics.
Compliance Implications: Unpatched systems may violate security policies (e.g., ISO 27001, NIST SP 800-53).
Patch Instructions
Recommended Update Methods
YaST Online Update (GUI)
Command Line (zypper):
# For openSUSE Leap 15.5: zypper in -t patch SUSE-2025-2430=1 # For SUSE Linux Enterprise Micro 5.5: zypper in -t patch SUSE-SLE-Micro-5.5-2025-2430=1
(Full commands for all affected systems are listed in the original advisory.)
Package Updates & Verification
After patching, verify the installed version matches:
iputils-20221126-150500.3.14.1 (or later)
Debug packages (iputils-debuginfo, iputils-debugsource) are also updated for forensic analysis.
Additional Resources
FAQ
Q: Is this vulnerability exploitable remotely?
A: Yes, but it requires user interaction (UI:P) and has limited impact.
Q: How urgent is this patch?
A: Moderate priority—apply within standard update cycles for production systems.
Q: Are non-SUSE distributions affected?
A: Check upstream iputils maintainers for advisories.

Nenhum comentário:
Postar um comentário