FERRAMENTAS LINUX: SUSELinux
Mostrando postagens com marcador SUSELinux. Mostrar todas as postagens
Mostrando postagens com marcador SUSELinux. Mostrar todas as postagens

quinta-feira, 10 de julho de 2025

Critical OpenSSL-3 Vulnerability Patched: CVE-2024-13176 Timing Side-Channel Fix

 

SUSE


SUSE’s OpenSSL-3 update fixes CVE-2024-13176, a critical timing side-channel flaw in ECDSA. Learn patch steps for SUSE Linux Micro 6.0, CVSS 6.0 impacts, and proactive hardening strategies to secure cryptographic operations against key leakage attacks.

sábado, 5 de julho de 2025

Critical Security Update: xorg-x11-server Patches High-Risk Vulnerability (CVE-2025-49176)

 

SUSE


Critical security update for xorg-x11-server fixes CVE-2025-49176 (CVSS 8.5), an integer overflow vulnerability in Big Requests Extension. Learn patch instructions for SUSE Linux Enterprise, openSUSE Leap 15.6, and affected modules. Secure your system now!

sexta-feira, 4 de julho de 2025

Critical Security Update: libgepub Vulnerability Patched (CVE-2025-6196)

 

SUSe


SUSE releases a critical security update for libgepub (CVE-2025-6196) addressing an EPUB integer overflow flaw. Learn how to patch affected SUSE Linux Enterprise systems and mitigate risks. Rated moderate with CVSS scores up to 6.7.

segunda-feira, 30 de junho de 2025

Critical Security Update: glib2 Vulnerabilities Patched (CVE-2025-4373 & CVE-2025-6052) – Update Now!

 

SUSE

SUSE has released an urgent glib2 security update addressing CVE-2025-4373 (buffer underflow) and CVE-2025-6052 (integer overflow leading to buffer overflow). Affected systems include SUSE Linux Enterprise 15 SP6/SP7, openSUSE Leap 15.6. Learn patch instructions, CVSS scores, and risks.

quinta-feira, 26 de junho de 2025

Critical Linux Kernel Security Update: Patch 17 for SLE 15 SP5 Fixes 8 High-Risk Vulnerabilities

 

SUSE


SUSE releases Live Patch 17 for SLE 15 SP5, addressing 8 critical CVEs (CVE-2024-56601, CVE-2024-53208, etc.) with CVSS scores up to 8.5. Learn how to protect your Linux systems from kernel-level exploits and optimize patch deployment.