<div class="container">
<h1>Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:03643-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-10-18T10:33:40Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248108">bsc#1248108</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248376">bsc#1248376</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248673">bsc#1248673</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1249534">bsc#1249534</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-38499.html">CVE-2025-38499</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-38566.html">CVE-2025-38566</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-38678.html">CVE-2025-38678</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-38499</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">6.2</span>
<span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-38499</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.4</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-38566</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">9.2</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-38566</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-38678</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.1</span>
<span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Live Patching 15-SP7</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP7</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP7</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP7</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves three vulnerabilities and has one security fix can now be installed.</p>
<h2>Description:</h2>
<p>This update for the Linux Kernel 6.4.0-150700_7_13 fixes several issues.</p>
<p>The following security issues were fixed:</p>
<ul>
<li>CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249534).</li>
<li>CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).</li>
<li>CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248376).</li>
<li>kernel-livepatch.spec: Replace kernel-syms with kernel-<flavor>-specific dependencies (bsc#1248108) The commit ead79afe7cbfae ("kernel-livepatch.spec: Update build dependencies for non-default flavors") broke build of livepatches which were built with kernel-syms-rt. The problem is that livepatch packages for already released kernels are built in exactly the same build environment as the initial livepatch. The BS (Build Service) installs the build environment using the given _buildinfo-*.xml and ignores BuildRequires. But the BuildRequires are later checked by rpmbuild tool. It would complain when new dependencies were added. Unfortunately, kernel-syms-rt does not exist on SLE16. This was the main motivation for the above mentioned commit. But the package kernel-syms is empty. Its only purpose is to add other dependencies. Replace it by opencoding the dependencies. Note that the kernel devel files are historically split into various packages, kernel-<flavor>-devel, kernel-devel-<flavor>, and even kernel-devel. But it is enough to require kernel-<flavor>-devel because it requires the other devel files on its own. This seems to be true back to SLE15-SP4 at minimum.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3643=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP7
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3647=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
<ul>
<li>kernel-livepatch-SLE15-SP6-RT_Update_14-debugsource-2-150600.2.1</li>
<li>kernel-livepatch-6_4_0-150600_10_49-rt-debuginfo-2-150600.2.1</li>
<li>kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Live Patching 15-SP7 (x86_64)
<ul>
<li>kernel-livepatch-SLE15-SP7-RT_Update_3-debugsource-2-150700.2.1</li>
<li>kernel-livepatch-6_4_0-150700_7_13-rt-debuginfo-2-150700.2.1</li>
<li>kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-38499.html">https://www.suse.com/security/cve/CVE-2025-38499.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-38566.html">https://www.suse.com/security/cve/CVE-2025-38566.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-38678.html">https://www.suse.com/security/cve/CVE-2025-38678.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248108">https://bugzilla.suse.com/show_bug.cgi?id=1248108</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248376">https://bugzilla.suse.com/show_bug.cgi?id=1248376</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1248673">https://bugzilla.suse.com/show_bug.cgi?id=1248673</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1249534">https://bugzilla.suse.com/show_bug.cgi?id=1249534</a>
</li>
</ul>
</div>