Integer Overflow or Wraparound Affecting iputils-sysvinit package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-IPUTILSSYSVINIT-10881016
  • published23 Jul 2025
  • disclosed22 Jul 2025

Introduced: 22 Jul 2025

NewCVE-2025-48964  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 iputils-sysvinit.

NVD Description

Note: Versions mentioned in the description apply only to the upstream iputils-sysvinit package and not the iputils-sysvinit package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

ping in iputils before 20250602 allows a denial of service (application error in adaptive ping mode or incorrect data collection) via a crafted ICMP Echo Reply packet, because a zero timestamp can lead to large intermediate values that have an integer overflow when squared during statistics calculations. NOTE: this issue exists because of an incomplete fix for CVE-2025-47268 (that fix was only about timestamp calculations, and it did not account for a specific scenario where the original timestamp in the ICMP payload is zero).

CVSS Base Scores

version 3.1