SUSE has released Live Patch 37 for Linux Kernel 5.14.21-150400_24_153, addressing the critical CVE-2024-57996 vulnerability (CVSS 8.5). Learn how to secure openSUSE Leap 15.4, SUSE Linux Enterprise Server, and HPC systems with this high-priority update. Includes patch instructions, affected products, and mitigation steps.
Why This Security Update Matters
The newly patched CVE-2024-57996 exposes Linux systems to privilege escalation risks via the net_sched subsystem. With a CVSS:4.0 score of 8.5, this flaw allows local attackers to exploit the sch_sfq queue discipline, potentially compromising enterprise servers, cloud deployments, and high-performance computing (HPC) environments.
Affected Products Include:
SUSE Linux Enterprise Server 15 SP4 (and SAP variants)
openSUSE Leap 15.4
SUSE Linux Enterprise Micro 5.3/5.4
SUSE Linux Enterprise Real Time 15 SP4
Patch Instructions & Installation Guide
How to Apply the Update
For openSUSE Leap 15.4:
zypper in -t patch SUSE-2025-1929=1
For SUSE Linux Enterprise Live Patching 15-SP4:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1929=1
Recommended Methods:
Use YaST Online Update for automated patching.
Enterprise users should test patches in staging environments before deployment.
Technical Deep Dive: CVE-2024-57996
Vulnerability Breakdown
Impact: Privilege escalation via malformed network packets.
CVSS 4.0 Score: 8.5 (High) – Exploitable locally without user interaction.
Fix: The patch enforces packet limit validation in
sch_sfq, preventing memory corruption.
Reference Links:
Enterprise Risk Mitigation Strategies
Prioritize Patching: Critical for systems handling sensitive data.
Monitor Kernel Logs: Check for unusual
net_schedactivity.Defense-in-Depth: Combine with SELinux/AppArmor for added protection.
FAQ: Linux Kernel Live Patching
Q: Can this update disrupt running services?
A: Live patching minimizes downtime, but reboot if instability occurs.
Q: Is this relevant for cloud deployments?
A: Yes, especially for AWS, Azure, and GCP instances running SUSE.

Nenhum comentário:
Postar um comentário