FERRAMENTAS LINUX: Critical SUSE PAM Security Update: Patch CVE-2024-10041 and Resolve CPU Performance Issues

terça-feira, 26 de agosto de 2025

Critical SUSE PAM Security Update: Patch CVE-2024-10041 and Resolve CPU Performance Issues

 



SUSE has released a critical security update (SUSE-SU-2025:02971-1) for PAM, addressing CVE-2024-10041 and a CPU performance regression. Learn about the vulnerability's CVSS 5.7 score, affected SUSE Linux Enterprise 12 SP5 systems, and how to patch them securely. Protect your enterprise servers now.


 Rating: Moderate

Is your SUSE Linux Enterprise Server 12 SP5 environment both secure and performant? A newly released patch from SUSE addresses a dual-threat scenario: a significant security vulnerability and a subsequent performance degradation introduced by its initial fix. 

This comprehensive update for the Pluggable Authentication Modules (PAM) library is crucial for system administrators prioritizing enterprise-grade security and optimal system performance. Understanding the implications of CVE-2024-10041 and the corrective patch is essential for maintaining a robust security posture.

Understanding the Vulnerability: CVE-2024-10041 Explained

The core of this security advisory revolves around CVE-2024-10041, a vulnerability identified within the SUSE Linux PAM infrastructure. This flaw presented a potential security risk that required immediate attention from the development team. 

The National Vulnerability Database (NVD) and SUSE's own security team assessed its severity using the Common Vulnerability Scoring System (CVSS), the industry standard for evaluating the seriousness of software vulnerabilities.

The ratings are as follows:

  • SUSE CVSS v4.0 Score: 5.7 (Medium Severity) - AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

  • SUSE & NVD CVSS v3.1 Score: 4.7 (Medium Severity) - AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

These scores indicate a local attack vector (AV:L) with high attack complexity (AC:H), meaning exploitation is difficult but could lead to high confidentiality impacts (VC:H/C:H), potentially allowing unauthorized access to sensitive information.

Affected Products and Systems: Is Your Infrastructure at Risk?

This security update is not broadly applicable to all SUSE distributions. It specifically targets legacy systems still operating on the SUSE Linux Enterprise Server 12 SP5 platform. System administrators must verify if their infrastructure includes any of the following affected products:

  • SUSE Linux Enterprise Server 12 SP5

  • SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security

  • SUSE Linux Enterprise Server for SAP Applications 12 SP5

If you are managing any of these environments, applying this patch is a critical item on your security maintenance checklist. For those on newer versions like SLE 15 or SLE 16, this specific vulnerability does not apply, demonstrating the importance of maintaining a current operating system lifecycle.

Patch Details: Security and Performance Enhancements

This update is more than a simple bug fix; it represents SUSE's commitment to both security and system efficiency. The patch delivers two key improvements:

  1. Enhanced Security Fix for CVE-2024-10041: This resolves the underlying vulnerability, mitigating the risk of local privilege escalation or information disclosure that the flaw could potentially allow.

  2. Resolution of CPU Performance Regression (bsc#1232234): The initial fix for the CVE inadvertently introduced a significant CPU overhead, negatively impacting system performance. This update optimizes the code, eliminating the performance penalty and restoring systems to their expected operational efficiency.

This dual correction ensures that systems are not only secure but also continue to run efficiently, a vital consideration for production servers where downtime and latency directly impact business operations.

Step-by-Step Patch Implementation Guide

Applying this update is a straightforward process for experienced Linux administrators. SUSE provides multiple recommended methods for patch management to ensure system integrity and compliance.

SUSE-Recommended Installation Methods:

  • YaST Online Update: The graphical tool for managing updates within the SUSE environment.

  • zypper patch Command: The preferred command-line method, as it applies all necessary patches in a single transaction, ensuring dependency consistency.

Direct Command for Affected Systems:
For systems specifically on SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security, you can execute the following direct command:

bash
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2971=1

Always remember to test patches in a staging environment before deploying them to production systems and to maintain verified backups.

Updated Package List and Components

The update modifies several packages within the PAM module to ensure comprehensive coverage. The following is a list of updated packages for the x86_64 and noarch architectures:

For x86_64 Systems:

  • pam-1.1.8-24.77.1

  • pam-32bit-1.1.8-24.77.1

  • pam-debuginfo-1.1.8-24.77.1

  • pam-debuginfo-32bit-1.1.8-24.77.1

  • pam-devel-1.1.8-24.77.1

  • pam-extra-1.1.8-24.77.1

  • pam-extra-32bit-1.1.8-24.77.1

  • pam-extra-debuginfo-1.1.8-24.77.1

  • pam-extra-debuginfo-32bit-1.1.8-24.77.1

  • pam-debugsource-1.1.8-24.77.1

For noarch (Architecture Independent):

  • pam-doc-1.1.8-24.77.1

Frequently Asked Questions (FAQ)


Q1: What is the real-world risk of CVE-2024-10041?

A1: With a CVSS score of 5.7, it is classified as moderate. It requires local access and high complexity to exploit, but a successful exploit could lead to a breach of confidential data. It should be patched promptly, especially on multi-user systems.

Q2: How significant was the CPU performance issue (bsc#1232234)?

A2: While SUSE doesn't release specific metrics, a performance regression significant enough to warrant a dedicated patch suggests a noticeable impact on system responsiveness and resource utilization, which is critical for server workloads.

Q3: Are cloud instances of SUSE Linux Enterprise Server 12 SP5 affected?

A3: Yes, if the underlying OS image is an affected product, the vulnerability is present regardless of the deployment model (on-premise, cloud, virtualized).

Q4: What is PAM and why is it important for Linux security?

A4: Pluggable Authentication Modules (PAM) is a central suite of libraries that handle authentication tasks for applications and services. A vulnerability in PAM is serious because it underpins the security of how users and services log into the system.

Conclusion: Prioritize Proactive Security Maintenance

This SUSE security update is a prime example of the continuous cycle of identify-patch-optimize that defines modern IT security. 

By addressing both a security vulnerability and its unintended performance consequence, SUSE provides a robust solution for maintaining stable and secure enterprise environments. 

System administrators for affected SUSE Linux Enterprise Server 12 SP5 systems should schedule the application of this patch immediately to mitigate risk and ensure optimal system performance. Regularly consulting thSUSE Security Announcements page should be a standard practice for all IT professionals managing SUSE infrastructure.

Action: Review your system inventory today. Confirm your SUSE Linux version and architecture, and apply this patch using the recommended zypper commands to fortify your servers against this vulnerability.

Nenhum comentário:

Postar um comentário