FERRAMENTAS LINUX: Critical Linux Kernel Security Update: Patch 3 Vulnerabilities in SLE 15 SP6 (CVE-2024-57996, CVE-2024-58013, CVE-2025-21680)

terça-feira, 17 de junho de 2025

Critical Linux Kernel Security Update: Patch 3 Vulnerabilities in SLE 15 SP6 (CVE-2024-57996, CVE-2024-58013, CVE-2025-21680)

 

SUSE


Urgent Linux Kernel security update for SUSE SLE 15 SP6 fixes 3 critical vulnerabilities (CVSS 7.0-8.5) including Bluetooth MGMT flaws and pktgen exploits. Learn patch instructions, CVE details, and enterprise security best practices for openSUSE Leap 15.6 and SUSE Linux Enterprise systems.

Why This Security Update Matters for Enterprise Linux Systems

The latest Linux Kernel Live Patch (Update 7 for SLE 15 SP6) addresses three high-severity vulnerabilities affecting enterprise-grade SUSE distributions. With CVSS scores up to 8.5, these flaws could allow privilege escalation, memory corruption, and network exploitation in critical infrastructure environments.

Key Affected Products:
✔ SUSE Linux Enterprise Server 15 SP6
✔ SUSE Linux Enterprise Live Patching 15-SP6
✔ openSUSE Leap 15.6
✔ SUSE Real Time and SAP-specific deployments

Detailed Vulnerability Analysis

1. CVE-2025-21680: pktgen Out-of-Bounds Access (CVSS 8.5)

Risk: Kernel memory corruption via malformed network packets
Impact: Root privilege escalation in virtualized environments
Patch: get_imix_entries() boundary check (bsc#1236701)

2. CVE-2024-58013: Bluetooth MGMT Use-After-Free (CVSS 7.8)

Risk: Remote code execution via malicious Bluetooth packets
Impact: Compromise of IoT and edge devices
Patch: Fixed mgmt_remove_adv_monitor_sync cleanup (bsc#1239096)

3. CVE-2024-57996: sch_sfq Packet Limit Exploit (CVSS 7.8)

Risk: Network QoS bypass leading to DoS conditions
Impact: Cloud infrastructure instability
Patch: Enforced minimum queue limits (bsc#1239077)

Step-by-Step Patch Instructions

For System Administrators:

bash
Copy
Download
# openSUSE Leap 15.6:
zypper in -t patch SUSE-2025-1957=1

# SUSE Live Patching 15-SP6:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1957=1

Recommended Methods:

  • YaST Online Update for GUI-based systems

  • Automated patching via SUSE Manager for enterprise deployments

  • Priority scheduling for real-time environments

Enterprise Security Recommendations

  1. Network Segmentation: Isolate systems pending updates

  2. Bluetooth Controls: Disable non-essential MGMT interfaces

  3. QoS Monitoring: Audit sch_sfq configurations in cloud environments

Supported Architectures:

  • x86_64 (Standard servers)

  • ppc64le (Power systems)

  • s390x (Mainframe environments)

FAQ: Linux Kernel Security Patches

Q: How urgent is this update?

A: Critical for systems using Bluetooth, virtual networking, or real-time processing.

Q: Can these vulnerabilities be exploited remotely?

A: CVE-2024-58013 requires Bluetooth proximity; others need local access.

Q: What's the performance impact of these patches?

A: Negligible (<1% overhead) for most workloads.

Nenhum comentário:

Postar um comentário