How can I get Opensuse patchs

Dear all
our security guys scan openSUSE Leap 15.5 that need fix it,I check SUSE that has patchs I want to get patch for openSUSE-SLE-15.5, How can I get patchs?
. For Linux kernel-default 5.14.21-150500.55.31.1 on OpenSUSE Linux 15.5

Patchnames:
openSUSE-SLE-15.5-2024-855
openSUSE-SLE-15.5-2024-858
openSUSE-SLE-15.5-2024-910

These vulnerabilities can be resolved with a single step. The estimated time to perform this step is 10 minutes.

Upgrade kernel-default

Estimated time: 10 minutes

kernel-default on SUSE Linux, OpenSUSE Linux

Please upgrade kernel-default using an update manager like YaST or zypper

This will address the following 86 issues:

SUSE: CVE-2023-2006: SUSE Linux Security Advisory (suse-cve-2023-2006)

SUSE: CVE-2023-20588: SUSE Linux Security Advisory (suse-cve-2023-20588)

SUSE: CVE-2023-2163: SUSE Linux Security Advisory (suse-cve-2023-2163)

SUSE: CVE-2023-25775: SUSE Linux Security Advisory (suse-cve-2023-25775)

SUSE: CVE-2023-28746: SUSE Linux Security Advisory (suse-cve-2023-28746)

SUSE: CVE-2023-31085: SUSE Linux Security Advisory (suse-cve-2023-31085)

SUSE: CVE-2023-34324: SUSE Linux Security Advisory (suse-cve-2023-34324)

SUSE: CVE-2023-3777: SUSE Linux Security Advisory (suse-cve-2023-3777)

SUSE: CVE-2023-39189: SUSE Linux Security Advisory (suse-cve-2023-39189)

SUSE: CVE-2023-39191: SUSE Linux Security Advisory (suse-cve-2023-39191)

SUSE: CVE-2023-39193: SUSE Linux Security Advisory (suse-cve-2023-39193)

SUSE: CVE-2023-39197: SUSE Linux Security Advisory (suse-cve-2023-39197)

SUSE: CVE-2023-39198: SUSE Linux Security Advisory (suse-cve-2023-39198)

SUSE: CVE-2023-4244: SUSE Linux Security Advisory (suse-cve-2023-4244)

SUSE: CVE-2023-45863: SUSE Linux Security Advisory (suse-cve-2023-45863)

SUSE: CVE-2023-45871: SUSE Linux Security Advisory (suse-cve-2023-45871)

SUSE: CVE-2023-46813: SUSE Linux Security Advisory (suse-cve-2023-46813)

SUSE: CVE-2023-46838: SUSE Linux Security Advisory (suse-cve-2023-46838)

SUSE: CVE-2023-46862: SUSE Linux Security Advisory (suse-cve-2023-46862)

SUSE: CVE-2023-47233: SUSE Linux Security Advisory (suse-cve-2023-47233)

SUSE: CVE-2023-4921: SUSE Linux Security Advisory (suse-cve-2023-4921)

SUSE: CVE-2023-51042: SUSE Linux Security Advisory (suse-cve-2023-51042)

SUSE: CVE-2023-51043: SUSE Linux Security Advisory (suse-cve-2023-51043)

SUSE: CVE-2023-5158: SUSE Linux Security Advisory (suse-cve-2023-5158)

SUSE: CVE-2023-51779: SUSE Linux Security Advisory (suse-cve-2023-51779)

SUSE: CVE-2023-5178: SUSE Linux Security Advisory (suse-cve-2023-5178)

SUSE: CVE-2023-51780: SUSE Linux Security Advisory (suse-cve-2023-51780)

SUSE: CVE-2023-51782: SUSE Linux Security Advisory (suse-cve-2023-51782)

SUSE: CVE-2023-5197: SUSE Linux Security Advisory (suse-cve-2023-5197)

SUSE: CVE-2023-52340: SUSE Linux Security Advisory (suse-cve-2023-52340)

SUSE: CVE-2023-52429: SUSE Linux Security Advisory (suse-cve-2023-52429)

SUSE: CVE-2023-52439: SUSE Linux Security Advisory (suse-cve-2023-52439)

SUSE: CVE-2023-52443: SUSE Linux Security Advisory (suse-cve-2023-52443)

SUSE: CVE-2023-52445: SUSE Linux Security Advisory (suse-cve-2023-52445)

SUSE: CVE-2023-52447: SUSE Linux Security Advisory (suse-cve-2023-52447)

SUSE: CVE-2023-52448: SUSE Linux Security Advisory (suse-cve-2023-52448)

SUSE: CVE-2023-52449: SUSE Linux Security Advisory (suse-cve-2023-52449)

SUSE: CVE-2023-52451: SUSE Linux Security Advisory (suse-cve-2023-52451)

SUSE: CVE-2023-52452: SUSE Linux Security Advisory (suse-cve-2023-52452)

SUSE: CVE-2023-52456: SUSE Linux Security Advisory (suse-cve-2023-52456)

SUSE: CVE-2023-52457: SUSE Linux Security Advisory (suse-cve-2023-52457)

SUSE: CVE-2023-52463: SUSE Linux Security Advisory (suse-cve-2023-52463)

SUSE: CVE-2023-52464: SUSE Linux Security Advisory (suse-cve-2023-52464)

SUSE: CVE-2023-52475: SUSE Linux Security Advisory (suse-cve-2023-52475)

SUSE: CVE-2023-52478: SUSE Linux Security Advisory (suse-cve-2023-52478)

SUSE: CVE-2023-5633: SUSE Linux Security Advisory (suse-cve-2023-5633)

SUSE: CVE-2023-5717: SUSE Linux Security Advisory (suse-cve-2023-5717)

SUSE: CVE-2023-6039: SUSE Linux Security Advisory (suse-cve-2023-6039)

SUSE: CVE-2023-6040: SUSE Linux Security Advisory (suse-cve-2023-6040)

SUSE: CVE-2023-6121: SUSE Linux Security Advisory (suse-cve-2023-6121)

SUSE: CVE-2023-6176: SUSE Linux Security Advisory (suse-cve-2023-6176)

SUSE: CVE-2023-6356: SUSE Linux Security Advisory (suse-cve-2023-6356)

SUSE: CVE-2023-6531: SUSE Linux Security Advisory (suse-cve-2023-6531)

SUSE: CVE-2023-6535: SUSE Linux Security Advisory (suse-cve-2023-6535)

SUSE: CVE-2023-6536: SUSE Linux Security Advisory (suse-cve-2023-6536)

SUSE: CVE-2023-6546: SUSE Linux Security Advisory (suse-cve-2023-6546)

SUSE: CVE-2023-6606: SUSE Linux Security Advisory (suse-cve-2023-6606)

SUSE: CVE-2023-6610: SUSE Linux Security Advisory (suse-cve-2023-6610)

SUSE: CVE-2023-6622: SUSE Linux Security Advisory (suse-cve-2023-6622)

SUSE: CVE-2023-6817: SUSE Linux Security Advisory (suse-cve-2023-6817)

SUSE: CVE-2023-6915: SUSE Linux Security Advisory (suse-cve-2023-6915)

SUSE: CVE-2023-6931: SUSE Linux Security Advisory (suse-cve-2023-6931)

SUSE: CVE-2023-6932: SUSE Linux Security Advisory (suse-cve-2023-6932)

SUSE: CVE-2024-0340: SUSE Linux Security Advisory (suse-cve-2024-0340)

SUSE: CVE-2024-0565: SUSE Linux Security Advisory (suse-cve-2024-0565)

SUSE: CVE-2024-0607: SUSE Linux Security Advisory (suse-cve-2024-0607)

SUSE: CVE-2024-0641: SUSE Linux Security Advisory (suse-cve-2024-0641)

SUSE: CVE-2024-0775: SUSE Linux Security Advisory (suse-cve-2024-0775)

SUSE: CVE-2024-1085: SUSE Linux Security Advisory (suse-cve-2024-1085)

SUSE: CVE-2024-1086: SUSE Linux Security Advisory (suse-cve-2024-1086)

SUSE: CVE-2024-1151: SUSE Linux Security Advisory (suse-cve-2024-1151)

SUSE: CVE-2024-23849: SUSE Linux Security Advisory (suse-cve-2024-23849)

SUSE: CVE-2024-23850: SUSE Linux Security Advisory (suse-cve-2024-23850)

SUSE: CVE-2024-23851: SUSE Linux Security Advisory (suse-cve-2024-23851)

SUSE: CVE-2024-24860: SUSE Linux Security Advisory (suse-cve-2024-24860)

SUSE: CVE-2024-25744: SUSE Linux Security Advisory (suse-cve-2024-25744)

SUSE: CVE-2024-26585: SUSE Linux Security Advisory (suse-cve-2024-26585)

SUSE: CVE-2024-26586: SUSE Linux Security Advisory (suse-cve-2024-26586)

SUSE: CVE-2024-26589: SUSE Linux Security Advisory (suse-cve-2024-26589)

SUSE: CVE-2024-26591: SUSE Linux Security Advisory (suse-cve-2024-26591)

SUSE: CVE-2024-26593: SUSE Linux Security Advisory (suse-cve-2024-26593)

SUSE: CVE-2024-26595: SUSE Linux Security Advisory (suse-cve-2024-26595)

SUSE: CVE-2024-26598: SUSE Linux Security Advisory (suse-cve-2024-26598)

SUSE: CVE-2024-26602: SUSE Linux Security Advisory (suse-cve-2024-26602)

SUSE: CVE-2024-26603: SUSE Linux Security Advisory (suse-cve-2024-26603)

SUSE: CVE-2024-26622: SUSE Linux Security Advisory (suse-cve-2024-26622)

Patchnames:
openSUSE-SLE-15.5-2024-855
openSUSE-SLE-15.5-2024-858
openSUSE-SLE-15.5-2024-910

If for your Installation necessary, they are installed.
For my Installation see Status: not needed

LANG=C zypper if -t patch openSUSE-SLE-15.5-2024-855
Loading repository data...
Reading installed packages...


Information for patch openSUSE-SLE-15.5-2024-855:
-------------------------------------------------
Repository  : Update repository with updates from SUSE Linux Enterprise 15
Name        : openSUSE-SLE-15.5-2024-855
Version     : 1
Arch        : noarch
Vendor      : maint-coord@suse.de
Status      : not needed
Category    : security
Severity    : important
Created On  : Di 12 Mär 2024 20:46:41 CET
Interactive : reboot
Summary     : Security update for the Linux Kernel
Description : 

    The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:

    - CVE-2023-6270: Fixed a use-after-free bug in aoecmd_cfg_pkts (bsc#1218562).
    - CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
    - CVE-2023-52462: Fixed a security check for attempt to corrupt spilled pointer (bsc#1220325).
    - CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
    - CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
    - CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
    - CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
    - CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
    - CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
    - CVE-2024-26585: Fixed race between tx work scheduling and socket close  (bsc#1220187).
    - CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
    - CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
    - CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
    - CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
    - CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
    - CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
    - CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
    - CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
    - CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
    - CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
    - CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
    - CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
    - CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
    - CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
    - CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
    - CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
    - CVE-2023-52443: Fixed crash when parsed profile name is empty  (bsc#1220240).
    - CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
    - CVE-2024-26586: Fixed stack corruption (bsc#1220243).
    - CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
    - CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
    - CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
    - CVE-2024-1151: Fixed unlimited number of recursions from action  sets (bsc#1219835).
    - CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
    - CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv  (bsc#1219127).
    - CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
    - CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).

    The following non-security bugs were fixed:

    - ACPI: APEI: set memory failure flags as MF_ACTION_REQUIRED on synchronous events (git-fixes).
    - ACPI: button: Add lid disable DMI quirk for Nextbook Ares 8A (git-fixes).
    - ACPI: extlog: fix NULL pointer dereference check (git-fixes).
.
.
.
.
.
.
    - xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).
Provides    : patch:openSUSE-SLE-15.5-2024-855 = 1
Conflicts   : [44]
    cluster-md-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    cluster-md-kmp-azure.noarch < 5.14.21-150500.33.37.1
    dlm-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    dlm-kmp-azure.noarch < 5.14.21-150500.33.37.1
    gfs2-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    gfs2-kmp-azure.noarch < 5.14.21-150500.33.37.1
    srcpackage:kernel-azure < 5.14.21-150500.33.37.1
    kernel-azure.noarch < 5.14.21-150500.33.37.1
    kernel-azure.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-devel.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-devel.noarch < 5.14.21-150500.33.37.1
    kernel-azure-extra.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-extra.noarch < 5.14.21-150500.33.37.1
    kernel-azure-livepatch-devel.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-livepatch-devel.noarch < 5.14.21-150500.33.37.1
    kernel-azure-optional.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-optional.noarch < 5.14.21-150500.33.37.1
    kernel-azure-vdso.x86_64 < 5.14.21-150500.33.37.1
    kernel-azure-vdso.noarch < 5.14.21-150500.33.37.1
    kernel-devel-azure < 5.14.21-150500.33.37.1
    kernel-source-azure < 5.14.21-150500.33.37.1
    srcpackage:kernel-source-azure < 5.14.21-150500.33.37.1
    kernel-source-azure.noarch < 5.14.21-150500.33.37.1
    srcpackage:kernel-syms-azure < 5.14.21-150500.33.37.1
    kernel-syms-azure.noarch < 5.14.21-150500.33.37.1
    kernel-syms-azure.x86_64 < 5.14.21-150500.33.37.1
    kselftests-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    kselftests-kmp-azure.noarch < 5.14.21-150500.33.37.1
    ocfs2-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    ocfs2-kmp-azure.noarch < 5.14.21-150500.33.37.1
    reiserfs-kmp-azure.x86_64 < 5.14.21-150500.33.37.1
    reiserfs-kmp-azure.noarch < 5.14.21-150500.33.37.1
    cluster-md-kmp-azure.aarch64 < 5.14.21-150500.33.37.1
    dlm-kmp-azure.aarch64 < 5.14.21-150500.33.37.1
    gfs2-kmp-azure.aarch64 < 5.14.21-150500.33.37.1
    kernel-azure.aarch64 < 5.14.21-150500.33.37.1
    kernel-azure-devel.aarch64 < 5.14.21-150500.33.37.1
    kernel-azure-extra.aarch64 < 5.14.21-150500.33.37.1
    kernel-azure-livepatch-devel.aarch64 < 5.14.21-150500.33.37.1
    kernel-azure-optional.aarch64 < 5.14.21-150500.33.37.1
    kernel-syms-azure.aarch64 < 5.14.21-150500.33.37.1
    kselftests-kmp-azure.aarch64 < 5.14.21-150500.33.37.1
    ocfs2-kmp-azure.aarch64 < 5.14.21-150500.33.37.1
    reiserfs-kmp-azure.aarch64 < 5.14.21-150500.33.37.1


LANG=C zypper in -t patch openSUSE-SLE-15.5-2024-855
Loading repository data...
Reading installed packages...
Patch 'openSUSE-SLE-15.5-2024-855-1' is not needed.
Resolving package dependencies...
Nothing to do.

LANG=C zypper in -t patch openSUSE-SLE-15.5-2024-858
Loading repository data...
Reading installed packages...
'patch:openSUSE-SLE-15.5-2024-858' is already installed.
Resolving package dependencies...
Nothing to do.

LANG=C zypper in -t patch openSUSE-SLE-15.5-2024-910
Loading repository data...
Reading installed packages...
Patch 'openSUSE-SLE-15.5-2024-910-1' is not needed.
Resolving package dependencies...
Nothing to do.

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.