<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03643-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-18T10:33:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-18T10:33:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-18T10:33:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7)</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for the Linux Kernel 6.4.0-150700_7_13 fixes several issues.

The following security issues were fixed:

- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249534).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).
- CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248376).
- kernel-livepatch.spec: Replace kernel-syms with kernel-&amp;lt;flavor&amp;gt;-specific dependencies (bsc#1248108)  The commit ead79afe7cbfae ('kernel-livepatch.spec: Update build  dependencies for non-default flavors') broke build of livepatches  which were built with kernel-syms-rt.  The problem is that livepatch packages for already released kernels  are built in exactly the same build environment as the initial livepatch.  The BS (Build Service) installs the build environment using the given  _buildinfo-*.xml and ignores BuildRequires. But the BuildRequires are  later checked by rpmbuild tool. It would complain when new dependencies  were added.  Unfortunately, kernel-syms-rt does not exist on SLE16. This was the main  motivation for the above mentioned commit.  But the package kernel-syms is empty. Its only purpose is to add other  dependencies. Replace it by opencoding the dependencies.  Note that the kernel devel files are historically split into various  packages, kernel-&amp;lt;flavor&amp;gt;-devel, kernel-devel-&amp;lt;flavor&amp;gt;, and  even kernel-devel. But it is enough to require kernel-&amp;lt;flavor&amp;gt;-devel  because it requires the other devel files on its own. This seems  to be true back to SLE15-SP4 at minimum.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-3643,SUSE-SLE-Module-Live-Patching-15-SP6-2025-3643,SUSE-SLE-Module-Live-Patching-15-SP7-2025-3647</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503643-1/</URL>
      <Description>Link for SUSE-SU-2025:03643-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03643-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248108</URL>
      <Description>SUSE Bug 1248108</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248376</URL>
      <Description>SUSE Bug 1248376</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248673</URL>
      <Description>SUSE Bug 1248673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249534</URL>
      <Description>SUSE Bug 1249534</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38499/</URL>
      <Description>SUSE CVE CVE-2025-38499 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38566/</URL>
      <Description>SUSE CVE CVE-2025-38566 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-38678/</URL>
      <Description>SUSE CVE CVE-2025-38678 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP6" CPE="cpe:/o:suse:sle-module-live-patching:15:sp6">SUSE Linux Enterprise Live Patching 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Live Patching 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Live Patching 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP7" CPE="cpe:/o:suse:sle-module-live-patching:15:sp7">SUSE Linux Enterprise Live Patching 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1">
      <FullProductName ProductID="kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1">kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1">
      <FullProductName ProductID="kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1">kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1">kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Live Patching 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1">kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.</Note>
    </Notes>
    <CVE>CVE-2025-38499</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503643-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38499.html</URL>
        <Description>CVE-2025-38499</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247976</URL>
        <Description>SUSE Bug 1247976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248673</URL>
        <Description>SUSE Bug 1248673</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix handling of server side tls alerts

Scott Mayhew discovered a security exploit in NFS over TLS in
tls_alert_recv() due to its assumption it can read data from
the msg iterator's kvec..

kTLS implementation splits TLS non-data record payload between
the control message buffer (which includes the type such as TLS
aler or TLS cipher change) and the rest of the payload (say TLS
alert's level/description) which goes into the msg payload buffer.

This patch proposes to rework how control messages are setup and
used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a
kvec backed msg buffer and read in the control message such as a
TLS alert. Msg iterator can advance the kvec pointer as a part of
the copy process thus we need to revert the iterator before calling
into the tls_alert_recv.</Note>
    </Notes>
    <CVE>CVE-2025-38566</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503643-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38566.html</URL>
        <Description>CVE-2025-38566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248374</URL>
        <Description>SUSE Bug 1248374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248376</URL>
        <Description>SUSE Bug 1248376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject duplicate device on updates

A chain/flowtable update with duplicated devices in the same batch is
possible. Unfortunately, netdev event path only removes the first
device that is found, leaving unregistered the hook of the duplicated
device.

Check if a duplicated device exists in the transaction batch, bail out
with EEXIST in such case.

WARNING is hit when unregistering the hook:

 [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150
 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                  6.16.0+ #170 PREEMPT(full)
 [...]
 [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150</Note>
    </Notes>
    <CVE>CVE-2025-38678</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_49-rt-2-150600.2.1</ProductID>
        <ProductID>SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_13-rt-2-150700.2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503643-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-38678.html</URL>
        <Description>CVE-2025-38678</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249126</URL>
        <Description>SUSE Bug 1249126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249534</URL>
        <Description>SUSE Bug 1249534</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
