FERRAMENTAS LINUX: Critical Linux Kernel Security Update: Live Patch 36 for SLE 15 SP4 (CVE-2022-49080 & CVE-2024-57996 Fixes)

sexta-feira, 13 de junho de 2025

Critical Linux Kernel Security Update: Live Patch 36 for SLE 15 SP4 (CVE-2022-49080 & CVE-2024-57996 Fixes)

 



SUSE releases urgent Linux Kernel Live Patch 36 for SLE 15 SP4, fixing critical vulnerabilities CVE-2022-49080 (memory leak) and CVE-2024-57996 (network exploit). Learn how to secure your enterprise systems with this high-priority update, including patch commands for openSUSE Leap 15.4 and SUSE Linux Enterprise.

Why This Security Update Matters

The Linux Kernel is the backbone of enterprise infrastructure, and unpatched vulnerabilities can lead to severe breaches. This SUSE-rated "important" update addresses two critical CVEs with CVSS scores up to 8.5 (High Severity), impacting:

  • Memory management (CVE-2022-49080)

  • Network scheduling (CVE-2024-57996)

Affected Products:

  • openSUSE Leap 15.4

  • SUSE Linux Enterprise Server 15 SP4 (including SAP/HPC/Real Time variants)

  • SUSE Linux Enterprise Micro 5.3/5.4

Vulnerability Breakdown & Risks

1. CVE-2022-49080: Memory Policy Leak (CVSS 7.3-7.8)

  • Impact: Kernel memory leak in shared_policy_replace, allowing local privilege escalation.

  • Exploitability: Low attack complexity (AC:L) but high confidentiality impact (VC:H).

  • ReferenceSUSE CVE Database

2. CVE-2024-57996: Network Scheduling Flaw (CVSS 7.8-8.5)

  • Impactsch_sfq packet limit bypass enabling DoS or remote code execution.

  • Exploitability: No user interaction required (UI:N), high integrity impact (VI:H).

  • ReferenceSUSE Bug #1239077


Patch Instructions for Enterprise Systems

Recommended Methods

  1. YaST Online Update: GUI-based patching for SUSE managers.

  2. Terminal Command:

    bash
    Copy
    Download
    # For SUSE Linux Enterprise Live Patching 15-SP4:
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1927=1
    
    # For openSUSE Leap 15.4:
    zypper in -t patch SUSE-2025-1927=1

Post-Update Verification

  • Confirm kernel version:

    bash
    Copy
    Download
    uname -r  # Should return 5.14.21-150400_24_150-default
  • Check installed patches:

    bash
    Copy
    Download
    zypper patches --cve=CVE-2022-49080,CVE-2024-57996


FAQ Section

Q: Can these vulnerabilities be exploited remotely?

A: CVE-2024-57996 requires network access, while CVE-2022-49080 is local-only.

Q: Is a reboot required after patching?

A: No—Live Patching applies fixes without reboots.

Q: How does this compare to Red Hat/CentOS patches?

A: SUSE’s Live Patching often outpaces competitors in zero-day response times.

Nenhum comentário:

Postar um comentário