SUSE SLES15 Security Update : kernel RT (Live Patch 14 for SLE 15 SP6) (SUSE-SU-2025:03643-1)

high Nessus Plugin ID 270858

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:03643-1 advisory.

This update for the Linux Kernel 6.4.0-150600_10_49 fixes several issues.

The following security issues were fixed:

- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249534).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).
- CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248376).
- kernel-livepatch.spec: Replace kernel-syms with kernel-<flavor>-specific dependencies (bsc#1248108) The commit ead79afe7cbfae ('kernel-livepatch.spec: Update build dependencies for non- default flavors') broke build of livepatches which were built with kernel-syms-rt. The problem is that livepatch packages for already released kernels are built in exactly the same build environment as the initial livepatch. The BS (Build Service) installs the build environment using the given
_buildinfo-*.xml and ignores BuildRequires. But the BuildRequires are later checked by rpmbuild tool. It would complain when new dependencies were added. Unfortunately, kernel-syms-rt does not exist on SLE16.
This was the main motivation for the above mentioned commit. But the package kernel-syms is empty. Its only purpose is to add other dependencies. Replace it by opencoding the dependencies. Note that the kernel devel files are historically split into various packages, kernel-<flavor>-devel, kernel- devel-<flavor>, and even kernel-devel. But it is enough to require kernel-<flavor>-devel because it requires the other devel files on its own. This seems to be true back to SLE15-SP4 at minimum.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected kernel-livepatch-6_4_0-150600_10_49-rt and / or kernel-livepatch-6_4_0-150700_7_13-rt packages.

See Also

https://bugzilla.suse.com/1248108

https://www.suse.com/security/cve/CVE-2025-38499

https://www.suse.com/security/cve/CVE-2025-38566

https://www.suse.com/security/cve/CVE-2025-38678

https://bugzilla.suse.com/1248376

https://bugzilla.suse.com/1248673

https://bugzilla.suse.com/1249534

https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html

Plugin Details

Severity: High

ID: 270858

File Name: suse_SU-2025-03643-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/21/2025

Updated: 10/21/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38566

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-38499

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150700_7_13-rt, p-cpe:/a:novell:suse_linux:kernel-livepatch-6_4_0-150600_10_49-rt, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/18/2025

Vulnerability Publication Date: 8/5/2025

Reference Information

CVE: CVE-2025-38499, CVE-2025-38566, CVE-2025-38678

SuSE: SUSE-SU-2025:03643-1