SUSE releases an urgent Linux Kernel security update (Live Patch 15 for SLE 15 SP5) fixing 9 critical CVEs, including Bluetooth, net, and dm cache vulnerabilities. Learn how to patch CVE-2024-56601, CVE-2024-50127, and more with step-by-step instructions for openSUSE Leap & SUSE Enterprise.
Why This Linux Kernel Security Update Matters
The latest SUSE Linux Kernel Live Patch (15 SP5) addresses nine high-risk vulnerabilities (CVSS scores up to 8.5) affecting critical subsystems like networking (inet/sched), Bluetooth (MGMT/L2CAP/SCO/ISO), and device-mapper cache. Unpatched systems risk privilege escalation, memory corruption, and remote code execution.
Key Vulnerabilities Fixed (Critical CVEs)
CVE-2024-56601 (CVSS 8.5) – Kernel memory leak in
inet_create()leading to privilege escalation.CVE-2024-50127 (CVSS 7.8) – Use-after-free in
taprio_change()causing system crashes.CVE-2024-53208 (CVSS 8.5) – Bluetooth MGMT slab-use-after-free allowing arbitrary code execution.
CVE-2024-50279 (CVSS 7.1) – Out-of-bounds access in
dm_cachedirty bitset during resizing.CVE-2024-40937 (CVSS 7.8) – Dangling SKB pointer in
gvedriver leading to memory corruption.
(Full CVE list with CVSS breakdown in SUSE Security Advisory SUSE-SU-2025:02106-1)
Affected Systems
This patch applies to:
✅ openSUSE Leap 15.5
✅ SUSE Linux Enterprise Server 15 SP5
✅ SUSE Linux Enterprise High Performance Computing 15 SP5
✅ SUSE Linux Enterprise Live Patching 15-SP5
✅ SUSE Linux Enterprise Micro 5.5
✅ SUSE Linux Enterprise Real Time 15 SP5
✅ SUSE Linux Enterprise Server for SAP Applications 15 SP5
How to Install the Security Update
Method 1: Using zypper (Recommended)
# For openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2106=1 SUSE-2025-2109=1 # For SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2106=1
Method 2: Via YaST Online Update
Open YaST → Online Update.
Select the patch (SUSE-SU-2025:02106-1).
Apply and reboot if required.
(Need help? SUSE Official Documentation)
Security Implications & Best Practices
⚠️ Delay = Risk: These vulnerabilities can be exploited for local privilege escalation (LPE) and denial-of-service (DoS).
🔒 Mitigation Steps:
Apply patches immediately if using affected kernels.
Restrict Bluetooth/USB access in high-security environments.
Monitor
/var/log/messagesfor kernel panics post-update.
FAQ: Linux Kernel Live Patching
Q: Does this require a reboot?
A: No, if using SUSE Live Patching—otherwise, a reboot is recommended.
Q: How do I verify the patch is active?
A: Run:
uname -r grep "livepatch" /proc/cmdline
Q: Are containers affected?
A: Yes, if running on an unpatched host kernel.
Final Thoughts
This high-priority update resolves severe memory safety flaws in Linux networking and Bluetooth stacks. Enterprises should schedule patching immediately to prevent exploitation.
📌 Need expert guidance? Consult SUSE’s Security Team.

Nenhum comentário:
Postar um comentário