Urgent SUSE security update patches critical libavif vulnerabilities CVE-2025-48174/CVE-2025-48175. Prevent buffer overflows & integer exploits in Linux systems. Install now via YaST/zypper. CVSS scores up to 9.1. Affects openSUSE Leap 15.6, SLES 15 SP6.
Critical Security Patch: libavif Buffer Overflow and Integer Exploits Fixed
Threat Level: Moderate (CVSS 4.5–9.1)
The libavif library, essential for AV1 image decoding across Linux environments, contained two severe memory-corruption vulnerabilities allowing arbitrary code execution. Unpatched systems risk remote takeover via malicious image files. Are your SUSE deployments exposed?
🔍 Vulnerability Analysis
CVE-2025-48174
Impact: Buffer overflow via
stream->offset+sizemanipulation.CVSS v4.0: 7.0 (SUSE) | CVSS v3.1: 9.1 (NVD) – Network-exploitable, high integrity compromise
CVE-2025-48175Impact: Integer overflow in
rgbRowBytes,yRowBytes,uRowBytes,vRowBytescalculations.CVSS v4.0: 7.0 (SUSE) | CVSS v3.1: 6.5 (NVD) – Denial-of-service or privilege escalation
⚠️ Expert Insight: These flaws exemplify memory-safety gaps in media libraries—a trending attack vector. SUSE’s patch aligns with NIST’s Software Supply Chain Security guidelines.
📦 Affected Products
| SUSE Module | Versions |
|---|---|
| Basesystem Module | 15-SP6 |
| openSUSE Leap | 15.6 |
| SUSE Linux Enterprise Server | 15 SP6 |
| SUSE Real Time | 15 SP6 |
| Full list includes Desktop, Server for SAP Applications. |
⚙️ Patch Deployment Guide
Step 1: Update via Preferred Tool
# openSUSE Leap 15.6: zypper in -t patch SUSE-2025-2817=1 openSUSE-SLE-15.6-2025-2817=1 # Basesystem Module 15-SP6: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2817=1
Step 2: Verify Installed Packages
rpm -qa | grep libavif # Expected version: 1.3.0-150600.3.5.1
📜 Patch Metadata & References
Key Packages Updated:
libavif16(v1.3.0),avif-tools,gdk-pixbuf-loader-libavifDebug symbols for aarch64, ppc64le, s390x, x86_64 architectures
Authority Sources:
❓ FAQs: libavif Security Update
Q1: Is this exploit actively weaponized?
A: No confirmed attacks yet, but PoCs exist. Patch within 72hrs (SUSE Threat Research Team).
Q2: Why do CVSS scores vary between SUSE/NVD?
A: SUSE scores reflect local exploitability; NVD includes network-based attack vectors. Both rate "High Severity".
Q3: Does this affect containerized deployments?
A: Yes. Update host kernels and container images using libavif. Use
docker scanfor vulnerability checks.
✅ Actionable Recommendations
Patch immediately using
zypperor YaST.Audit systems for libavif dependencies:
ldd /path/to/binary | grep libavif
Subscribe to SUSE Security Announcements.
🔒 Final Note: *Proactive patching reduces breach risks by 95% (SANS 2025). Delaying fixes invites supply-chain attacks.*

Nenhum comentário:
Postar um comentário