FERRAMENTAS LINUX: Critical Linux Kernel Security Update: Live Patch 15 for SLE 15 SP5 (CVE Fixes & Installation Guide)

quinta-feira, 26 de junho de 2025

Critical Linux Kernel Security Update: Live Patch 15 for SLE 15 SP5 (CVE Fixes & Installation Guide)

 

SUSE


SUSE releases an urgent Linux Kernel security update (Live Patch 15 for SLE 15 SP5) fixing 9 critical CVEs, including Bluetooth, net, and dm cache vulnerabilities. Learn how to patch CVE-2024-56601, CVE-2024-50127, and more with step-by-step instructions for openSUSE Leap & SUSE Enterprise.


Why This Linux Kernel Security Update Matters

The latest SUSE Linux Kernel Live Patch (15 SP5) addresses nine high-risk vulnerabilities (CVSS scores up to 8.5) affecting critical subsystems like networking (inet/sched), Bluetooth (MGMT/L2CAP/SCO/ISO), and device-mapper cache. Unpatched systems risk privilege escalation, memory corruption, and remote code execution.

Key Vulnerabilities Fixed (Critical CVEs)

  1. CVE-2024-56601 (CVSS 8.5) – Kernel memory leak in inet_create() leading to privilege escalation.

  2. CVE-2024-50127 (CVSS 7.8) – Use-after-free in taprio_change() causing system crashes.

  3. CVE-2024-53208 (CVSS 8.5) – Bluetooth MGMT slab-use-after-free allowing arbitrary code execution.

  4. CVE-2024-50279 (CVSS 7.1) – Out-of-bounds access in dm_cache dirty bitset during resizing.

  5. CVE-2024-40937 (CVSS 7.8) – Dangling SKB pointer in gve driver leading to memory corruption.

(Full CVE list with CVSS breakdown in SUSE Security Advisory SUSE-SU-2025:02106-1)

Affected Systems

This patch applies to:
✅ openSUSE Leap 15.5
✅ SUSE Linux Enterprise Server 15 SP5
✅ SUSE Linux Enterprise High Performance Computing 15 SP5
✅ SUSE Linux Enterprise Live Patching 15-SP5
✅ SUSE Linux Enterprise Micro 5.5
✅ SUSE Linux Enterprise Real Time 15 SP5
✅ SUSE Linux Enterprise Server for SAP Applications 15 SP5

How to Install the Security Update

Method 1: Using zypper (Recommended)

bash
# For openSUSE Leap 15.5  
zypper in -t patch SUSE-2025-2106=1 SUSE-2025-2109=1  

# For SUSE Linux Enterprise Live Patching 15-SP5  
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2106=1  

Method 2: Via YaST Online Update

  1. Open YaST → Online Update.

  2. Select the patch (SUSE-SU-2025:02106-1).

  3. Apply and reboot if required.

(Need help? SUSE Official Documentation)

Security Implications & Best Practices

⚠️ Delay = Risk: These vulnerabilities can be exploited for local privilege escalation (LPE) and denial-of-service (DoS).
🔒 Mitigation Steps:

  • Apply patches immediately if using affected kernels.

  • Restrict Bluetooth/USB access in high-security environments.

  • Monitor /var/log/messages for kernel panics post-update.

FAQ: Linux Kernel Live Patching

Q: Does this require a reboot?

A: No, if using SUSE Live Patching—otherwise, a reboot is recommended.

Q: How do I verify the patch is active?

A: Run:

bash
uname -r  
grep "livepatch" /proc/cmdline  

Q: Are containers affected?

A: Yes, if running on an unpatched host kernel.

Final Thoughts

This high-priority update resolves severe memory safety flaws in Linux networking and Bluetooth stacks. Enterprises should schedule patching immediately to prevent exploitation.

📌 Need expert guidance? Consult SUSE’s Security Team.

Nenhum comentário:

Postar um comentário