• 公告ID (KylinSec-SA-2025-2892)

摘要:

iputils security update

安全等级: Medium

公告ID: KylinSec-SA-2025-2892

发布日期: 2025年9月26日

关联CVE: CVE-2025-48964  

  • 详细介绍

1. 漏洞描述

   

The iputils package contains basic utilities for monitoring a network, including ping. The ping command sends a series of ICMP protocol ECHO_REQUEST packets to a specified network host to discover whether the target machine is alive and receiving network traffic.

Security Fix(es):

ping in iputils before 20250602 allows a denial of service (application error in adaptive ping mode or incorrect data collection) via a crafted ICMP Echo Reply packet, because a zero timestamp can lead to large intermediate values that have an integer overflow when squared during statistics calculations. NOTE: this issue exists because of an incomplete fix for CVE-2025-47268 (that fix was only about timestamp calculations, and it did not account for a specific scenario where the original timestamp in the ICMP payload is zero).(CVE-2025-48964)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2025-48964 V6 iputils Fixed

3. 影响组件

    iputils

4. 修复版本

   

V6

软件名称 架构 版本号
iputils-help noarch 20221126-8.ks6
iputils x86_64 20221126-8.ks6
iputils aarch64 20221126-8.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     iputils-help   

     iputils   

aarch64:

     iputils-help   

     iputils   

上一篇:KylinSec-SA-2025-2891 下一篇:KylinSec-SA-2025-2899