FERRAMENTAS LINUX: Critical OpenSUSE Linux Security Update: Addressing Cockpit Remote Access Vulnerabilities (SLE-WU-2026-38129-5)

sábado, 21 de fevereiro de 2026

Critical OpenSUSE Linux Security Update: Addressing Cockpit Remote Access Vulnerabilities (SLE-WU-2026-38129-5)

 




Urgent openSUSE Leap 16.0 security update SLE-WU-2026-38129-5 addresses critical Cockpit remote access vulnerabilities. Patch CVE-2025-13465 (prototype pollution) and CVE-2025-64718 (js-yaml RCE risk) now. Includes cockpit-repos 4.7 with critical dependency fixes and translation updates. Apply via zypper.

Is your Linux server's remote management interface a hidden backdoor for attackers? For system administrators and DevOps engineers managing openSUSE Leap 16.0 environments, the recently released patch SLE-WU-2026-38129-5 is not a routine update. It is a critical intervention targeting two high-severity vulnerabilities in the Cockpit remote access framework

This update, which advances cockpit-repos to version 4.7, neutralizes specific prototype pollution flaws in core JavaScript dependencies that could allow attackers to execute arbitrary code or destabilize your system.

Failing to apply this patch immediately could expose your infrastructure to remote code execution (RCE) and denial-of-service (DoS) attacks. This analysis breaks down the technical impact of these CVEs, the contents of the patch, and the precise commands required to harden your instance against active exploitation.

Executive Summary: The SLE-WU-2026-38129-5 Patch

This official openSUSE security patch addresses two distinct Common Vulnerabilities and Exposures (CVEs) alongside critical bug fixes that enhance the stability of the Cockpit web console. 

The update transitions the cockpit-repos package from version 4.4 to 4.7, incorporating upstream dependency changes that are vital for maintaining a secure and efficient server management stack.

  • Distribution: openSUSE Leap 16.0

  • Package: cockpit-repos

  • Patched Version: 4.7-160000.1.1

  • Severity: Critical (Remote Code Execution Potential)

Deep Dive: The Vulnerabilities Patched

The core of this update lies in resolving two significant security flaws originating from third-party JavaScript libraries used by Cockpit. Understanding these vulnerabilities is the first step in appreciating the urgency of this patch.

CVE-2025-13465: Prototype Pollution in Core Utility Functions

This vulnerability resides in the _.unset and _.omit functions, commonly found in utility libraries like Lodash or similar toolkits. Prototype pollution is a sophisticated attack vector where a malicious actor manipulates the __proto__ property of a JavaScript object.

Technical Impact:

By polluting the prototype, an attacker can inject arbitrary properties into all objects within the application. In the context of cockpit-repos, this could lead to:

  • Deletion of Global Methods: As noted in the official changelog (bsc#1257325), an attacker could delete essential methods, causing the application to throw uncaught exceptions and crash (Denial of Service).

  • Property Injection: Modifying the behavior of existing objects, potentially bypassing authentication checks or altering application logic.

CVE-2025-64718: Js-YAML Merge Exploit

YAML parsing is critical for configuration management in Linux environments. This CVE identifies a prototype pollution vulnerability within the js-yaml library, specifically in how it handles the merge key (bsc#1255425).

Technical Impact:

If Cockpit or its repositories process a maliciously crafted YAML file, the parser could be tricked into polluting the object prototype. This can lead to:

  • Remote Code Execution (RCE): In specific contexts, prototype pollution can be chained with other gadget attacks to execute arbitrary commands on the host system.

  • Configuration Hijacking: An attacker could modify the structure of configuration objects as they are loaded, leading to unpredictable system behavior.

Patch Instructions: How to Secure Your openSUSE Leap 16.0 Instance

For production environments, minimizing downtime while ensuring security is paramount. SUSE and openSUSE recommend using the standard update tooling. Here are the precise commands to remediate these vulnerabilities:

Method 1: Using Zypper (Recommended for CLI)

SSH into your server and execute the following command to apply the specific patch:

bash
zypper in -t patch openSUSE-Leap-16.0-296=1

This command tells Zypper to install patch openSUSE-Leap-16.0-296, which explicitly contains the security fixes and bug resolutions for cockpit-repos.

Method 2: Using YaST (Graphical Interface)

For administrators who prefer a graphical interface:

  1. Open YaST.

  2. Navigate to Software > Online Update.

  3. Accept the patch openSUSE-Leap-16.0-296 or simply apply all available security updates.

Verification

After the update, verify the installation by checking the package version:

bash
rpm -q cockpit-repos

The output should read: cockpit-repos-4.7-160000.1.1

Bug Fixes and Enhancements in Cockpit 4.7

Beyond security, this update streamlines the Cockpit experience. The incremental updates from version 4.4 to 4.7 include several quality-of-life improvements that reduce technical debt and improve user experience.

  • Version 4.5: Focused on dependency updates, ensuring the underlying libraries are current and free of non-critical bugs.

  • Version 4.6: Addressed a critical internationalization (i18n) workflow issue by fixing the translations POT file generation, ensuring non-English locales display correctly. Dependency updates continued.

  • Version 4.7: Brings the latest translation updates and finalizes the dependency refresh, culminating in a stable and secure release.

Frequently Asked Questions (FAQ)

Q: Is Cockpit exposed to the internet? Do I need to patch immediately?

A: If Cockpit (usually on port 9090) is exposed to any network beyond your immediate trusted LAN, the risk is significantly higher. However, even in internal networks, a compromised workstation could use these vulnerabilities to move laterally. Patch immediately regardless of exposure.

Q: Can these vulnerabilities be exploited without authentication?

A: While the vulnerabilities exist in the codebase, exploitation complexity varies. Prototype pollution often requires some level of interaction or specific input. However, relying on authentication as a shield is poor security practice. The patch removes the flaw at the source.

Q: What is "prototype pollution" in simple terms?

A: Imagine a blueprint for a house (the prototype). If someone pollutes the blueprint, every house built from it suddenly has a hidden, faulty door. In JavaScript, if you pollute the "object blueprint," every piece of data in the app becomes potentially vulnerable or unstable.

Nenhum comentário:

Postar um comentário