FERRAMENTAS LINUX: Critical SUSE Linux Security Update: CVE-2024-10041 Threat Patch (2025-1511-1)

sexta-feira, 9 de maio de 2025

Critical SUSE Linux Security Update: CVE-2024-10041 Threat Patch (2025-1511-1)

 

SUSE


Critical SUSE Linux patch for CVE-2024-10041 fixes AppArmor shadow file vulnerability. Learn how to secure openSUSE Leap 15.6 & SUSE Enterprise systems now. CVSS 5.7 threat—patch via zypper/YaST.

Overview of the Vulnerability & Patch

high-priority security update has been released for SUSE Linux systems, addressing CVE-2024-10041, a vulnerability affecting AppArmor and PAM (Pluggable Authentication Modules)

This flaw, rated 5.7 CVSS (v4.0), could allow unauthorized access to sensitive files, including the shadow password file, under specific conditions.

This patch ensures enhanced system security by granting the dac_read_search capability to unix_chkpwd, allowing it to read restricted files even with 000 permissions—a necessary fix following recent PAM security updates.

Affected Products

  • openSUSE Leap 15.6

  • SUSE Linux Enterprise Server 15 SP6

  • SUSE Linux Enterprise Desktop 15 SP6

  • Basesystem & Development Tools Modules (15-SP6)

  • Server Applications Module (15-SP6)

🔴 Threat Level: Moderate (CVSS 4.7-5.7)

🔴 Exploit Risk: Local privilege escalation (if leveraged)


How to Install the Security Update

Recommended Methods

  1. YaST Online Update (GUI-based)

  2. Command Line (zypper)

Patch Commands by Product

  • openSUSE Leap 15.6:

    bash
    Copy
    Download
    zypper in -t patch openSUSE-SLE-15.6-2025-1511=1 SUSE-2025-1511=1
  • Basesystem Module 15-SP6:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1511=1
  • Development Tools Module 15-SP6:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1511=1
  • Server Applications Module 15-SP6:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1511=1

⚠️ Note: Delaying this update may expose systems to local privilege escalation risks.


Technical Details & CVSS Scoring

CVE-2024-10041 Breakdown

MetricScore (CVSS v4.0)Score (CVSS v3.1)
Attack VectorLocal (AV:L)Local (AV:L)
Attack ComplexityHigh (AC:H)High (AC:H)
Privileges RequiredLow (PR:L)Low (PR:L)
User InteractionNone (UI:N)None (UI:N)
Confidentiality ImpactHigh (VC:H)High (C:H)

🔹 Primary Risk: Unauthorized shadow file access (potential credential exposure).
🔹 Mitigation: Immediate patch application.


Why This Update Matters for Enterprise Security

Key Implications for Businesses

  • Compliance Risks: Unpatched systems may violate GDPR, HIPAA, or PCI-DSS requirements.

  • Security Best Practices: Ensures least privilege enforcement in Linux environments.

  • Threat Prevention: Mitigates potential post-exploitation lateral movement.

Additional Resources

📌 SUSE Security Advisory
📌 Bugzilla Report (bsc#1241678)


FAQ: CVE-2024-10041 Security Patch

❓ Is this vulnerability actively exploited?

→ No known in-the-wild exploits, but patching is strongly recommended.

❓ Does this affect containers/Kubernetes?

→ Only if AppArmor profiles are enforced in containerized environments.

❓ Can I manually fix this without updating?

→ Not recommended—official patches ensure stability & compatibility.


Final Recommendations

✅ Apply the patch immediately via zypper or YaST.

✅ Monitor logs for unusual unix_chkpwd activity.

✅ Review AppArmor policies for custom hardening.

Stay secure, stay updated.

Nenhum comentário:

Postar um comentário