SUSE Linux Micro 6.0 releases a critical security update for GPG2, addressing CVE-2025-30258, a denial-of-service (DoS) vulnerability. Learn patch instructions, CVSS scores, and affected packages to secure your system. Stay protected with SUSE’s latest fixes.
Critical Security Vulnerability Patched in SUSE Linux Micro 6.0
A newly discovered GPG2 vulnerability (CVE-2025-30258) could allow attackers to trigger a denial-of-service (DoS) attack via malicious subkeys. This high-priority security update from SUSE Linux Micro 6.0 resolves the issue, ensuring system stability and security.
🔹 Why is this update critical?
Fixes a regression from a previous DoS patch.
Prevents malicious subkey exploitation in GPG2.
Patches vulnerabilities tracked under bsc#1236931, bsc#1239119.
Patch Instructions & Installation Guide
To apply this security update, use one of the following SUSE-recommended methods:
✅ Recommended:
YaST Online Update (GUI-based patching)
Zypper Patch (CLI method)
💻 Manual Installation Command:
zypper in -t patch SUSE-SLE-Micro-6.0-370=1
📦 Affected Packages:
gpg2-2.4.4-4.1
gpg2-debugsource-2.4.4-4.1
gpg2-debuginfo-2.4.4-4.1
(Supports aarch64, s390x, x86_64 architectures)
CVE-2025-30258: Vulnerability Analysis & CVSS Scores
This GPG2 flaw has been rated under CVSS v3.1 and v4.0, indicating low to moderate risk:
📊 CVSS v3.1 Scores:
SUSE: 2.7 (AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L)
NVD: 2.7 (Same vector)
📊 CVSS v4.0 Score (SUSE): 1.8
(Low impact due to local attack vector & high complexity)
🔗 Official References:
Why Should You Apply This Update Immediately?
🚨 Security Risks if Unpatched:
Attackers could crash GPG2 processes, disrupting encryption workflows.
Potential system instability in environments relying on GPG-signed packages.
🛡️ Best Practices for Linux Security:
Enable automatic updates for critical patches.
Monitor SUSE security advisories for new threats.
Verify GPG signatures when installing third-party software.
FAQ: SUSE Linux Micro 6.0 GPG2 Update
❓ Is this vulnerability exploitable remotely?
A: No, CVE-2025-30258 requires local access (AV:L), reducing exposure risk.
❓ Does this affect other SUSE distributions?
A: Currently, only SUSE Linux Micro 6.0 is confirmed impacted.
❓ How do I verify the patch was applied?
A: Run:
rpm -q gpg2 --changelog | grep CVE-2025-30258

Nenhum comentário:
Postar um comentário