FERRAMENTAS LINUX: Critical Linux Kernel Security Update: Live Patch 6 for SLE 15 SP6 (CVE-2024-57996, CVE-2024-58013, CVE-2025-21680)

domingo, 15 de junho de 2025

Critical Linux Kernel Security Update: Live Patch 6 for SLE 15 SP6 (CVE-2024-57996, CVE-2024-58013, CVE-2025-21680)

 

SUSE

SUSE has released a critical Linux Kernel security update (Live Patch 6 for SLE 15 SP6) addressing 3 high-risk vulnerabilities (CVSS 7.0–8.5), including Bluetooth MGMT and pktgen exploits. Learn patch instructions, CVE details, and enterprise implications.

Why This Security Update Matters for Enterprises

The Linux Kernel is the backbone of modern IT infrastructure, powering everything from cloud servers to IoT devices. This SUSE-rated "important" update patches three critical vulnerabilities (CVSS scores up to 8.5) that could lead to:

  • Privilege escalation (CVE-2025-21680) via pktgen’s out-of-bounds access.

  • Bluetooth stack exploits (CVE-2024-58013) triggering slab-use-after-free attacks.

  • Network scheduling flaws (CVE-2024-57996) in sch_sfq allowing denial-of-service.

Affected Products:

✅ SUSE Linux Enterprise Server 15 SP6

✅ SUSE Real Time 15 SP6

✅ openSUSE Leap 15.6

✅ SAP Applications 15 SP6

Patch Instructions & Mitigation

How to Apply the Update

  1. Recommended Methods:

    • Use YaST online_update for automated patching.

    • Run zypper patch for command-line control.

  2. Product-Specific Commands:

    bash
    Copy
    Download
    # openSUSE Leap 15.6
    zypper in -t patch SUSE-2025-1944=1
    
    # SUSE Live Patching 15-SP6
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1944=1

Technical Deep Dive: CVEs and CVSS Scores


CVE IDCVSS 4.0CVSS 3.1Vulnerability Impact
CVE-2025-216808.57.8pktgen OOB access → privilege escalation
CVE-2024-580137.07.8Bluetooth MGMT UAF → RCE potential
CVE-2024-579968.57.8sch_sfq limit bypass → DoS risk

Enterprise Risk Assessment:

Nenhum comentário:

Postar um comentário