Urgent Linux kernel security update: SUSE patches 4 critical vulnerabilities (CVE-2025-38494, CVE-2025-38495, CVE-2025-38079, CVE-2025-38083) with CVSS scores up to 8.5. Learn about the risks of privilege escalation, denial-of-service attacks, and how to secure your SUSE Linux Enterprise 15 SP6 and openSUSE Leap 15.6 systems immediately.
A new SUSE Linux Enterprise Live Patch has been released, addressing four significant security vulnerabilities in the Linux kernel. Rated "important," this update (SUSE-SU-2025:02918-1) is crucial for system administrators managing enterprise infrastructure, cloud deployments, and high-performance computing environments.
Failure to apply these patches could leave systems exposed to local privilege escalation and denial-of-service (DoS) attacks, potentially compromising critical business data and operational integrity.
This proactive maintenance is a cornerstone of robust cyber hygiene and enterprise risk management. In today's threat landscape, where unpatched kernels are a primary target for threat actors, timely application of security updates is not just recommended—it's imperative for maintaining a strong security posture and ensuring business continuity.
Detailed Analysis of the Patched Vulnerabilities
The live patch for the Linux kernel (version 6.4.0-150600_23_38) mitigates four specific Common Vulnerabilities and Exposures (CVE). Understanding the nature of each threat is key to appreciating the update's criticality.
CVE-2025-38494 (CVSS 8.5/4.0): A flaw in the Human Interface Device (HID) core subsystem. The vulnerability, referenced in bug report bsc#1247350, involved a logic error where the system did not properly bypass the
hid_hw_raw_requestfunction under certain conditions. This could allow a local attacker with user privileges to manipulate HID communications, potentially executing arbitrary code or causing a system crash.
CVE-2025-38495 (CVSS 8.5/4.0): Another critical issue within the HID core, documented in bsc#1247351. This vulnerability stemmed from an insufficient buffer allocation that did not properly account for the reserved report ID. An attacker could exploit this buffer miscalculation to overflow the allocated memory, leading to a system crash or a state conducive to privilege escalation.
CVE-2025-38079 (CVSS 7.3/4.0): A double-free vulnerability discovered in the kernel's cryptographic API, specifically within the
algif_hashcomponent (bsc#1245218). A double-free error occurs when a program calls thefree()function twice on the same memory address, which can corrupt the kernel's memory management data structures. This corruption is a classic vector for achieving local privilege escalation or a DoS condition.
CVE-2025-38083 (CVSS 7.8/3.1): A race condition flaw in the network packet scheduling subsystem, within the
prio_tune()function (bsc#1245350). Race conditions occur when the output of a process is unexpectedly dependent on the sequence of other events. In this case, a local attacker could potentially manipulate the network scheduler's internal state, leading to unpredictable behavior or a system panic.
Affected Products and Patch Instructions
Which SUSE Linux distributions are impacted by this security bulletin? The following enterprise-grade and community-supported products require immediate attention:
openSUSE Leap 15.6
SUSE Linux Enterprise Server 15 SP6
SUSE Linux Enterprise Server for SAP Applications 15 SP6
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise Live Patching 12-SP5
SUSE Linux Enterprise Live Patching 15-SP6
SUSE Linux Enterprise Real Time 15 SP6
To apply the update: SUSE recommends using standard system management tools like YaST online_update or the Zypper package manager from the command line. Here are the specific commands for your product:
SUSE Linux Enterprise Live Patching 12-SP5:
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-2918=1openSUSE Leap 15.6:
zypper in -t patch SUSE-2025-2920=1SUSE Linux Enterprise Live Patching 15-SP6:
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2920=1
After applying the patch, a system reboot is typically not required thanks to SUSE's live patching technology, which allows for the application of critical security fixes without interrupting running services—a key feature for maintaining high availability in server environments.
Conclusion and Best Practices for System Security
This security update is a mandatory action for all administrators of affected systems. The high CVSS scores, particularly the 8.5 ratings for the HID-related vulnerabilities, indicate a severe potential impact on the confidentiality, integrity, and availability (CIA triad) of your systems.
Beyond applying this specific patch, organizations should enforce a consistent patch management policy, conduct regular vulnerability assessments, and subscribe to official security mailing lists from their OS vendors.
For SUSE users, this means leveraging the SUSE Customer Center for notifications. Remember, in cybersecurity, diligence is your best defense.
Frequently Asked Questions (FAQ)
Q: What is a live kernel patch?
A: Live kernel patching is a technology that allows security updates to be applied to a running Linux kernel without requiring a system reboot. This is essential for maintaining 24/7 uptime for critical servers and services.
Q: How serious are these vulnerabilities?
A: Very serious. With CVSS scores ranging from 7.0 to 8.5, these vulnerabilities could allow a local user to escalate their privileges to root level, crash the system, or execute arbitrary code, fundamentally compromising the machine's security.
Q: Do I need to reboot after applying this update?
A: No. The primary purpose of the "Live Patching" module is to apply fixes without a reboot. Your systems can continue running uninterrupted.
Q: Where can I find more technical details?
A: Always refer to the primary sources for the most accurate information. The official CVE pages and SUSE bug reports are linked in the references below.
Official References:

Nenhum comentário:
Postar um comentário