FERRAMENTAS LINUX: Critical Linux Kernel Security Update: Patch 4 New Vulnerabilities in SUSE SLE 15 SP6 Now

quinta-feira, 21 de agosto de 2025

Critical Linux Kernel Security Update: Patch 4 New Vulnerabilities in SUSE SLE 15 SP6 Now

 

SUSE



Urgent Linux kernel security update: SUSE patches 4 critical vulnerabilities (CVE-2025-38494, CVE-2025-38495, CVE-2025-38079, CVE-2025-38083) with CVSS scores up to 8.5. Learn about the risks of privilege escalation, denial-of-service attacks, and how to secure your SUSE Linux Enterprise 15 SP6 and openSUSE Leap 15.6 systems immediately.


A new SUSE Linux Enterprise Live Patch has been released, addressing four significant security vulnerabilities in the Linux kernel. Rated "important," this update (SUSE-SU-2025:02918-1) is crucial for system administrators managing enterprise infrastructure, cloud deployments, and high-performance computing environments. 

Failure to apply these patches could leave systems exposed to local privilege escalation and denial-of-service (DoS) attacks, potentially compromising critical business data and operational integrity.

This proactive maintenance is a cornerstone of robust cyber hygiene and enterprise risk management. In today's threat landscape, where unpatched kernels are a primary target for threat actors, timely application of security updates is not just recommended—it's imperative for maintaining a strong security posture and ensuring business continuity.

Detailed Analysis of the Patched Vulnerabilities

The live patch for the Linux kernel (version 6.4.0-150600_23_38) mitigates four specific Common Vulnerabilities and Exposures (CVE). Understanding the nature of each threat is key to appreciating the update's criticality.

  • CVE-2025-38494 (CVSS 8.5/4.0): A flaw in the Human Interface Device (HID) core subsystem. The vulnerability, referenced in bug report bsc#1247350, involved a logic error where the system did not properly bypass the hid_hw_raw_request function under certain conditions. This could allow a local attacker with user privileges to manipulate HID communications, potentially executing arbitrary code or causing a system crash.

  • CVE-2025-38495 (CVSS 8.5/4.0): Another critical issue within the HID core, documented in bsc#1247351. This vulnerability stemmed from an insufficient buffer allocation that did not properly account for the reserved report ID. An attacker could exploit this buffer miscalculation to overflow the allocated memory, leading to a system crash or a state conducive to privilege escalation.

  • CVE-2025-38079 (CVSS 7.3/4.0): A double-free vulnerability discovered in the kernel's cryptographic API, specifically within the algif_hash component (bsc#1245218). A double-free error occurs when a program calls the free() function twice on the same memory address, which can corrupt the kernel's memory management data structures. This corruption is a classic vector for achieving local privilege escalation or a DoS condition.

  • CVE-2025-38083 (CVSS 7.8/3.1): A race condition flaw in the network packet scheduling subsystem, within the prio_tune() function (bsc#1245350). Race conditions occur when the output of a process is unexpectedly dependent on the sequence of other events. In this case, a local attacker could potentially manipulate the network scheduler's internal state, leading to unpredictable behavior or a system panic.

Affected Products and Patch Instructions

Which SUSE Linux distributions are impacted by this security bulletin? The following enterprise-grade and community-supported products require immediate attention:

  • openSUSE Leap 15.6

  • SUSE Linux Enterprise Server 15 SP6

  • SUSE Linux Enterprise Server for SAP Applications 15 SP6

  • SUSE Linux Enterprise High Performance Computing 12 SP5

  • SUSE Linux Enterprise Live Patching 12-SP5

  • SUSE Linux Enterprise Live Patching 15-SP6

  • SUSE Linux Enterprise Real Time 15 SP6

To apply the update: SUSE recommends using standard system management tools like YaST online_update or the Zypper package manager from the command line. Here are the specific commands for your product:

  • SUSE Linux Enterprise Live Patching 12-SP5zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-2918=1

  • openSUSE Leap 15.6zypper in -t patch SUSE-2025-2920=1

  • SUSE Linux Enterprise Live Patching 15-SP6zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2920=1

After applying the patch, a system reboot is typically not required thanks to SUSE's live patching technology, which allows for the application of critical security fixes without interrupting running services—a key feature for maintaining high availability in server environments.

Conclusion and Best Practices for System Security

This security update is a mandatory action for all administrators of affected systems. The high CVSS scores, particularly the 8.5 ratings for the HID-related vulnerabilities, indicate a severe potential impact on the confidentiality, integrity, and availability (CIA triad) of your systems.

Beyond applying this specific patch, organizations should enforce a consistent patch management policy, conduct regular vulnerability assessments, and subscribe to official security mailing lists from their OS vendors. 

For SUSE users, this means leveraging the SUSE Customer Center for notifications. Remember, in cybersecurity, diligence is your best defense.

Frequently Asked Questions (FAQ)


Q: What is a live kernel patch?

A: Live kernel patching is a technology that allows security updates to be applied to a running Linux kernel without requiring a system reboot. This is essential for maintaining 24/7 uptime for critical servers and services.

Q: How serious are these vulnerabilities?

A: Very serious. With CVSS scores ranging from 7.0 to 8.5, these vulnerabilities could allow a local user to escalate their privileges to root level, crash the system, or execute arbitrary code, fundamentally compromising the machine's security.

Q: Do I need to reboot after applying this update?

A: No. The primary purpose of the "Live Patching" module is to apply fixes without a reboot. Your systems can continue running uninterrupted.

Q: Where can I find more technical details?

A: Always refer to the primary sources for the most accurate information. The official CVE pages and SUSE bug reports are linked in the references below.

Official References:

Nenhum comentário:

Postar um comentário