SUSE releases urgent Linux Kernel Live Patch 36 for SLE 15 SP4, fixing critical vulnerabilities CVE-2022-49080 (memory leak) and CVE-2024-57996 (network exploit). Learn how to secure your enterprise systems with this high-priority update, including patch commands for openSUSE Leap 15.4 and SUSE Linux Enterprise.
Why This Security Update Matters
The Linux Kernel is the backbone of enterprise infrastructure, and unpatched vulnerabilities can lead to severe breaches. This SUSE-rated "important" update addresses two critical CVEs with CVSS scores up to 8.5 (High Severity), impacting:
Memory management (CVE-2022-49080)
Network scheduling (CVE-2024-57996)
Affected Products:
openSUSE Leap 15.4
SUSE Linux Enterprise Server 15 SP4 (including SAP/HPC/Real Time variants)
SUSE Linux Enterprise Micro 5.3/5.4
Vulnerability Breakdown & Risks
1. CVE-2022-49080: Memory Policy Leak (CVSS 7.3-7.8)
Impact: Kernel memory leak in
shared_policy_replace, allowing local privilege escalation.Exploitability: Low attack complexity (AC:L) but high confidentiality impact (VC:H).
Reference: SUSE CVE Database
2. CVE-2024-57996: Network Scheduling Flaw (CVSS 7.8-8.5)
Impact:
sch_sfqpacket limit bypass enabling DoS or remote code execution.Exploitability: No user interaction required (UI:N), high integrity impact (VI:H).
Reference: SUSE Bug #1239077
Patch Instructions for Enterprise Systems
Recommended Methods
YaST Online Update: GUI-based patching for SUSE managers.
Terminal Command:
# For SUSE Linux Enterprise Live Patching 15-SP4: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1927=1 # For openSUSE Leap 15.4: zypper in -t patch SUSE-2025-1927=1
Post-Update Verification
Confirm kernel version:
uname -r # Should return 5.14.21-150400_24_150-default
Check installed patches:
zypper patches --cve=CVE-2022-49080,CVE-2024-57996
FAQ Section
Q: Can these vulnerabilities be exploited remotely?
A: CVE-2024-57996 requires network access, while CVE-2022-49080 is local-only.
Q: Is a reboot required after patching?
A: No—Live Patching applies fixes without reboots.
Q: How does this compare to Red Hat/CentOS patches?
A: SUSE’s Live Patching often outpaces competitors in zero-day response times.

Nenhum comentário:
Postar um comentário