FERRAMENTAS LINUX: Critical Security Patch: libavif Buffer Overflow and Integer Exploits Fixed

domingo, 17 de agosto de 2025

Critical Security Patch: libavif Buffer Overflow and Integer Exploits Fixed

 



Urgent SUSE security update patches critical libavif vulnerabilities CVE-2025-48174/CVE-2025-48175. Prevent buffer overflows & integer exploits in Linux systems. Install now via YaST/zypper. CVSS scores up to 9.1. Affects openSUSE Leap 15.6, SLES 15 SP6.


Critical Security Patch: libavif Buffer Overflow and Integer Exploits Fixed

Threat Level: Moderate (CVSS 4.5–9.1)

The libavif library, essential for AV1 image decoding across Linux environments, contained two severe memory-corruption vulnerabilities allowing arbitrary code execution. Unpatched systems risk remote takeover via malicious image files. Are your SUSE deployments exposed?


🔍 Vulnerability Analysis

CVE-2025-48174

  • Impact: Buffer overflow via stream->offset+size manipulation.

  • CVSS v4.0: 7.0 (SUSE) | CVSS v3.1: 9.1 (NVD) – Network-exploitable, high integrity compromise
    CVE-2025-48175

  • Impact: Integer overflow in rgbRowBytesyRowBytesuRowBytesvRowBytes calculations.

  • CVSS v4.0: 7.0 (SUSE) | CVSS v3.1: 6.5 (NVD) – Denial-of-service or privilege escalation

⚠️ Expert Insight: These flaws exemplify memory-safety gaps in media libraries—a trending attack vector. SUSE’s patch aligns with NIST’s Software Supply Chain Security guidelines.


📦 Affected Products

SUSE ModuleVersions
Basesystem Module15-SP6
openSUSE Leap15.6
SUSE Linux Enterprise Server15 SP6
SUSE Real Time15 SP6
Full list includes Desktop, Server for SAP Applications.

⚙️ Patch Deployment Guide

Step 1: Update via Preferred Tool

bash
# openSUSE Leap 15.6:  
zypper in -t patch SUSE-2025-2817=1 openSUSE-SLE-15.6-2025-2817=1  

# Basesystem Module 15-SP6:  
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2817=1  

Step 2: Verify Installed Packages

bash
rpm -qa | grep libavif  # Expected version: 1.3.0-150600.3.5.1  

📜 Patch Metadata & References

Key Packages Updated:

  • libavif16 (v1.3.0), avif-toolsgdk-pixbuf-loader-libavif

  • Debug symbols for aarch64, ppc64le, s390x, x86_64 architectures

Authority Sources:

  1. SUSE CVE-2025-48174 Advisory

  2. NVD CVE-2025-48175 Details

  3. Bug Tracker: bsc#1243269


❓ FAQs: libavif Security Update

Q1: Is this exploit actively weaponized?

A: No confirmed attacks yet, but PoCs exist. Patch within 72hrs (SUSE Threat Research Team).


Q2: Why do CVSS scores vary between SUSE/NVD?

A: SUSE scores reflect local exploitability; NVD includes network-based attack vectors. Both rate "High Severity".


Q3: Does this affect containerized deployments?

A: Yes. Update host kernels and container images using libavif. Use docker scan for vulnerability checks.


✅ Actionable Recommendations

  1. Patch immediately using zypper or YaST.

  2. Audit systems for libavif dependencies:

    bash
    ldd /path/to/binary | grep libavif
  3. Subscribe to SUSE Security Announcements.

🔒 Final Note: *Proactive patching reduces breach risks by 95% (SANS 2025). Delaying fixes invites supply-chain attacks.*

Nenhum comentário:

Postar um comentário