SUSE 5000 Published by

The following updates are available for openSUSE Leap and SUSE Linux Enterprise:

SUSE-SU-2024:0238-1: moderate: Security update for cpio
SUSE-SU-2024:0241-1: moderate: Security update for jasper
SUSE-SU-2024:0224-1: important: Security update for apache-parent, apache-sshd
SUSE-SU-2024:0229-1: important: Security update for MozillaFirefox
SUSE-SU-2024:0208-1: moderate: Security update for tomcat10
SUSE-SU-2024:0204-1: important: Security update for bluez
SUSE-SU-2024:0212-1: moderate: Security update for xwayland
SUSE-SU-2024:0205-1: important: Security update for python-Pillow
SUSE-SU-2024:0200-1: important: Security update for redis7
SUSE-SU-2024:0182-1: important: Security update for bluez
SUSE-SU-2024:0172-1: moderate: Security update for openssl-3
SUSE-SU-2024:0183-1: important: Security update for bluez
SUSE-SU-2024:0168-1: moderate: Security update for python-aiohttp
SUSE-SU-2024:0156-1: important: Security update for the Linux Kernel
SUSE-SU-2024:0157-1: moderate: Security update for libcryptopp
SUSE-SU-2024:0136-1: moderate: Security update for pam



SUSE-SU-2024:0238-1: moderate: Security update for cpio


# Security update for cpio

Announcement ID: SUSE-SU-2024:0238-1
Rating: moderate
References:

* bsc#1218571

Cross-References:

* CVE-2023-7207

CVSS scores:

* CVE-2023-7207 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for cpio fixes the following issues:

* CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary
file write during archive extraction (bsc#1218571).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-238=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-238=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-238=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-238=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-238=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-238=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-238=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-238=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-238=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-238=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* cpio-mt-debuginfo-2.13-150400.3.3.1
* cpio-mt-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* cpio-debugsource-2.13-150400.3.3.1
* openSUSE Leap 15.4 (noarch)
* cpio-lang-2.13-150400.3.3.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cpio-mt-debuginfo-2.13-150400.3.3.1
* cpio-mt-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* cpio-debugsource-2.13-150400.3.3.1
* openSUSE Leap 15.5 (noarch)
* cpio-lang-2.13-150400.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* cpio-debugsource-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cpio-mt-debuginfo-2.13-150400.3.3.1
* cpio-mt-2.13-150400.3.3.1
* cpio-debuginfo-2.13-150400.3.3.1
* cpio-2.13-150400.3.3.1
* cpio-debugsource-2.13-150400.3.3.1
* Basesystem Module 15-SP5 (noarch)
* cpio-lang-2.13-150400.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2023-7207.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218571



SUSE-SU-2024:0241-1: moderate: Security update for jasper


# Security update for jasper

Announcement ID: SUSE-SU-2024:0241-1
Rating: moderate
References:

* bsc#1218802

Cross-References:

* CVE-2023-51257

CVSS scores:

* CVE-2023-51257 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2023-51257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for jasper fixes the following issues:

* CVE-2023-51257: Fixed an out of bounds write in the JPC encoder
(bsc#1218802).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-241=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-241=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-241=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* jasper-2.0.14-150000.3.31.1
* libjasper4-2.0.14-150000.3.31.1
* jasper-debugsource-2.0.14-150000.3.31.1
* libjasper-devel-2.0.14-150000.3.31.1
* libjasper4-debuginfo-2.0.14-150000.3.31.1
* jasper-debuginfo-2.0.14-150000.3.31.1
* openSUSE Leap 15.5 (x86_64)
* libjasper4-32bit-2.0.14-150000.3.31.1
* libjasper4-32bit-debuginfo-2.0.14-150000.3.31.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* jasper-debugsource-2.0.14-150000.3.31.1
* libjasper4-debuginfo-2.0.14-150000.3.31.1
* libjasper4-2.0.14-150000.3.31.1
* jasper-debuginfo-2.0.14-150000.3.31.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* jasper-debugsource-2.0.14-150000.3.31.1
* libjasper-devel-2.0.14-150000.3.31.1
* jasper-debuginfo-2.0.14-150000.3.31.1

## References:

* https://www.suse.com/security/cve/CVE-2023-51257.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218802



SUSE-SU-2024:0224-1: important: Security update for apache-parent, apache-sshd


# Security update for apache-parent, apache-sshd

Announcement ID: SUSE-SU-2024:0224-1
Rating: important
References:

* bsc#1205463
* bsc#1218189

Cross-References:

* CVE-2022-45047
* CVE-2023-48795

CVSS scores:

* CVE-2022-45047 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products:

* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for apache-parent, apache-sshd fixes the following issues:

apache-parent was updated from version 28 to 31:

* Version 31:
* New Features:
* Added maven-checkstyle-plugin to pluginManagement
* Improvements:
* Set minimalMavenBuildVersion to 3.6.3 - the minimum used by plugins
* Using an SPDX identifier as the license name is recommended by Maven
* Use properties to define the versions of plugins
* Bugs fixed:
* Updated documentation for previous changes

apache-sshd was updated from version 2.7.0 to 2.12.0:

* Security issues fixed:
* CVE-2023-48795: Implemented OpenSSH "strict key exchange" protocol in
apache-sshd version 2.12.0 (bsc#1218189)
* CVE-2022-45047: Java unsafe deserialization vulnerability fixed in apache-
sshd version 2.9.2 (bsc#1205463)

* Other changes in version 2.12.0:

* Bugs fixed:
* SCP client fails silently when error signalled due to missing file or lacking permissions
* Ignore unknown key types from agent or in OpenSSH host keys extension
* New Features:
* Support GIT protocol-v2
* Other changes in version 2.11.0:
* Bugs fixed:
* Added configurable timeout(s) to DefaultSftpClient
* Compare file keys in ModifiableFileWatcher.
* Fixed channel pool in SftpFileSystem.
* Use correct default OpenOptions in SftpFileSystemProvider.newFileChannel().
* Use correct lock modes for SFTP FileChannel.lock().
* ScpClient: support issuing commands to a server that uses a non-UTF-8 locale.
* SftpInputStreamAsync: fix reporting EOF on zero-length reads.
* Work-around a bug in WS_FTP dax to NULL in fuse_dax_conn_free() (bsc#1218659).
* libceph: use kernel_connect() (bsc#1217981).
* mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
* net/smc: Fix pos miscalculation in statistics (bsc#1218139).
* net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
* nfs: only issue commit in DIO codepath if we have uncommitted data
(bsc#1211162).
* remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
* s390/vx: fix save/restore of fpu kernel context (bsc#1218357).
* scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
* swiotlb: fix a braino in the alignment check fix (bsc#1216559).
* swiotlb: fix slot alignment checks (bsc#1216559).
* tracing: Disable preemption when using the filter buffer (bsc#1217036).
* tracing: Fix a possible race when disabling buffered events (bsc#1217036).
* tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
* tracing: Fix incomplete locking when disabling buffered events
(bsc#1217036).
* tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036).
* tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver()
(bsc#1217036).
* uapi: propagate __struct_group() attributes to the container union
(jsc#SLE-18978).
* vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
* x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
* x86/platform/uv: Use alternate source for socket to node data (bsc#1215696
bsc#1217790).
* x86/tsc: Add option to force frequency recalibration with HW timer
(bsc#1215885 bsc#1217217).
* x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
* x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885
bsc#1217217).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-156=1

* SUSE Linux Enterprise Real Time 15 SP4
zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-156=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-156=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-156=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-156=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-156=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-156=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-156=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-156=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-156=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-156=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-156=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-156=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-156=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-debugsource-5.14.21-150400.24.103.1
* kernel-64kb-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* reiserfs-kmp-default-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Real Time 15 SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Real Time 15 SP4 (x86_64)
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Real Time 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Real Time 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-extra-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-debugsource-5.14.21-150400.24.103.1
* kernel-64kb-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* reiserfs-kmp-default-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* reiserfs-kmp-default-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Manager Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.103.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (noarch)
* kernel-docs-html-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-source-vanilla-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* kernel-source-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-devel-5.14.21-150400.24.103.1
* kernel-debug-debuginfo-5.14.21-150400.24.103.1
* kernel-debug-debugsource-5.14.21-150400.24.103.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.103.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.103.1
* kernel-kvmsmall-devel-5.14.21-150400.24.103.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.103.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.103.1
* kernel-default-base-rebuild-5.14.21-150400.24.103.1.150400.24.48.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-default-optional-5.14.21-150400.24.103.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1
* reiserfs-kmp-default-5.14.21-150400.24.103.1
* ocfs2-kmp-default-5.14.21-150400.24.103.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1
* cluster-md-kmp-default-5.14.21-150400.24.103.1
* dlm-kmp-default-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-livepatch-devel-5.14.21-150400.24.103.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* gfs2-kmp-default-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-obs-qa-5.14.21-150400.24.103.1
* kernel-default-extra-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* kernel-default-livepatch-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kselftests-kmp-default-5.14.21-150400.24.103.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (aarch64)
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-extra-5.14.21-150400.24.103.1
* dtb-socionext-5.14.21-150400.24.103.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* dtb-amazon-5.14.21-150400.24.103.1
* dtb-freescale-5.14.21-150400.24.103.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* dtb-lg-5.14.21-150400.24.103.1
* ocfs2-kmp-64kb-5.14.21-150400.24.103.1
* dtb-mediatek-5.14.21-150400.24.103.1
* dtb-hisilicon-5.14.21-150400.24.103.1
* dtb-altera-5.14.21-150400.24.103.1
* dlm-kmp-64kb-5.14.21-150400.24.103.1
* dtb-sprd-5.14.21-150400.24.103.1
* dtb-amlogic-5.14.21-150400.24.103.1
* kernel-64kb-debugsource-5.14.21-150400.24.103.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.103.1
* kernel-64kb-devel-5.14.21-150400.24.103.1
* dtb-nvidia-5.14.21-150400.24.103.1
* dtb-qcom-5.14.21-150400.24.103.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1
* gfs2-kmp-64kb-5.14.21-150400.24.103.1
* kernel-64kb-debuginfo-5.14.21-150400.24.103.1
* reiserfs-kmp-64kb-5.14.21-150400.24.103.1
* dtb-xilinx-5.14.21-150400.24.103.1
* dtb-apm-5.14.21-150400.24.103.1
* dtb-apple-5.14.21-150400.24.103.1
* dtb-marvell-5.14.21-150400.24.103.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.103.1
* dtb-renesas-5.14.21-150400.24.103.1
* dtb-rockchip-5.14.21-150400.24.103.1
* kernel-64kb-optional-5.14.21-150400.24.103.1
* kselftests-kmp-64kb-5.14.21-150400.24.103.1
* dtb-amd-5.14.21-150400.24.103.1
* dtb-arm-5.14.21-150400.24.103.1
* dtb-cavium-5.14.21-150400.24.103.1
* dtb-allwinner-5.14.21-150400.24.103.1
* dtb-exynos-5.14.21-150400.24.103.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1
* dtb-broadcom-5.14.21-150400.24.103.1
* cluster-md-kmp-64kb-5.14.21-150400.24.103.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.103.1
* openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64)
* kernel-default-5.14.21-150400.24.103.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* openSUSE Leap Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-default-livepatch-5.14.21-150400.24.103.1
* kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-5.14.21-150400.24.103.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1
* ocfs2-kmp-default-5.14.21-150400.24.103.1
* gfs2-kmp-default-5.14.21-150400.24.103.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* cluster-md-kmp-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-debugsource-5.14.21-150400.24.103.1
* kernel-64kb-debuginfo-5.14.21-150400.24.103.1
* kernel-64kb-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1
* kernel-obs-build-5.14.21-150400.24.103.1
* kernel-default-debugsource-5.14.21-150400.24.103.1
* kernel-obs-build-debugsource-5.14.21-150400.24.103.1
* reiserfs-kmp-default-5.14.21-150400.24.103.1
* kernel-default-devel-5.14.21-150400.24.103.1
* kernel-syms-5.14.21-150400.24.103.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.103.1
* kernel-default-debuginfo-5.14.21-150400.24.103.1
* kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.103.1
* kernel-macros-5.14.21-150400.24.103.1
* kernel-devel-5.14.21-150400.24.103.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.103.1

## References:

* https://www.suse.com/security/cve/CVE-2020-26555.html
* https://www.suse.com/security/cve/CVE-2023-51779.html
* https://www.suse.com/security/cve/CVE-2023-6121.html
* https://www.suse.com/security/cve/CVE-2023-6531.html
* https://www.suse.com/security/cve/CVE-2023-6546.html
* https://www.suse.com/security/cve/CVE-2023-6606.html
* https://www.suse.com/security/cve/CVE-2023-6610.html
* https://www.suse.com/security/cve/CVE-2023-6622.html
* https://www.suse.com/security/cve/CVE-2023-6931.html
* https://www.suse.com/security/cve/CVE-2023-6932.html
* https://bugzilla.suse.com/show_bug.cgi?id=1179610
* https://bugzilla.suse.com/show_bug.cgi?id=1183045
* https://bugzilla.suse.com/show_bug.cgi?id=1193285
* https://bugzilla.suse.com/show_bug.cgi?id=1211162
* https://bugzilla.suse.com/show_bug.cgi?id=1211226
* https://bugzilla.suse.com/show_bug.cgi?id=1212584
* https://bugzilla.suse.com/show_bug.cgi?id=1214747
* https://bugzilla.suse.com/show_bug.cgi?id=1214823
* https://bugzilla.suse.com/show_bug.cgi?id=1215237
* https://bugzilla.suse.com/show_bug.cgi?id=1215696
* https://bugzilla.suse.com/show_bug.cgi?id=1215885
* https://bugzilla.suse.com/show_bug.cgi?id=1216057
* https://bugzilla.suse.com/show_bug.cgi?id=1216559
* https://bugzilla.suse.com/show_bug.cgi?id=1216776
* https://bugzilla.suse.com/show_bug.cgi?id=1217036
* https://bugzilla.suse.com/show_bug.cgi?id=1217217
* https://bugzilla.suse.com/show_bug.cgi?id=1217250
* https://bugzilla.suse.com/show_bug.cgi?id=1217602
* https://bugzilla.suse.com/show_bug.cgi?id=1217692
* https://bugzilla.suse.com/show_bug.cgi?id=1217790
* https://bugzilla.suse.com/show_bug.cgi?id=1217801
* https://bugzilla.suse.com/show_bug.cgi?id=1217933
* https://bugzilla.suse.com/show_bug.cgi?id=1217938
* https://bugzilla.suse.com/show_bug.cgi?id=1217946
* https://bugzilla.suse.com/show_bug.cgi?id=1217947
* https://bugzilla.suse.com/show_bug.cgi?id=1217980
* https://bugzilla.suse.com/show_bug.cgi?id=1217981
* https://bugzilla.suse.com/show_bug.cgi?id=1217982
* https://bugzilla.suse.com/show_bug.cgi?id=1218056
* https://bugzilla.suse.com/show_bug.cgi?id=1218139
* https://bugzilla.suse.com/show_bug.cgi?id=1218184
* https://bugzilla.suse.com/show_bug.cgi?id=1218234
* https://bugzilla.suse.com/show_bug.cgi?id=1218253
* https://bugzilla.suse.com/show_bug.cgi?id=1218258
* https://bugzilla.suse.com/show_bug.cgi?id=1218335
* https://bugzilla.suse.com/show_bug.cgi?id=1218357
* https://bugzilla.suse.com/show_bug.cgi?id=1218447
* https://bugzilla.suse.com/show_bug.cgi?id=1218515
* https://bugzilla.suse.com/show_bug.cgi?id=1218559
* https://bugzilla.suse.com/show_bug.cgi?id=1218569
* https://bugzilla.suse.com/show_bug.cgi?id=1218659
* https://jira.suse.com/browse/PED-3459
* https://jira.suse.com/browse/PED-5021
* https://jira.suse.com/browse/PED-7322



SUSE-SU-2024:0157-1: moderate: Security update for libcryptopp


# Security update for libcryptopp

Announcement ID: SUSE-SU-2024:0157-1
Rating: moderate
References:

* bsc#1218222

Cross-References:

* CVE-2023-50981

CVSS scores:

* CVE-2023-50981 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-50981 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for libcryptopp fixes the following issues:

* CVE-2023-50981: Fixed a potential denial of service issue via crafted DER
public key data (bsc#1218222).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-157=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-157=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-157=1

* SUSE Linux Enterprise Real Time 15 SP4
zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-157=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1
* libcryptopp8_6_0-8.6.0-150400.3.6.1
* libcryptopp-debugsource-8.6.0-150400.3.6.1
* libcryptopp-devel-8.6.0-150400.3.6.1
* openSUSE Leap 15.4 (x86_64)
* libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1
* libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcryptopp8_6_0-64bit-8.6.0-150400.3.6.1
* libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1
* libcryptopp8_6_0-8.6.0-150400.3.6.1
* libcryptopp-debugsource-8.6.0-150400.3.6.1
* libcryptopp-devel-8.6.0-150400.3.6.1
* openSUSE Leap 15.5 (x86_64)
* libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1
* libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1
* libcryptopp8_6_0-8.6.0-150400.3.6.1
* libcryptopp-debugsource-8.6.0-150400.3.6.1
* libcryptopp-devel-8.6.0-150400.3.6.1
* SUSE Linux Enterprise Real Time 15 SP4 (x86_64)
* libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1
* libcryptopp8_6_0-8.6.0-150400.3.6.1
* libcryptopp-debugsource-8.6.0-150400.3.6.1
* libcryptopp-devel-8.6.0-150400.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-50981.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218222



SUSE-SU-2024:0136-1: moderate: Security update for pam


# Security update for pam

Announcement ID: SUSE-SU-2024:0136-1
Rating: moderate
References:

* bsc#1217000
* bsc#1218475

Cross-References:

* CVE-2024-22365

CVSS scores:

* CVE-2024-22365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE CaaS Platform 4.0
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for pam fixes the following issues:

* CVE-2024-22365: Fixed a local denial of service during PAM login due to a
missing check during path manipulation (bsc#1218475).
* Check localtime_r() return value to fix crashing (bsc#1217000)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-136=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-136=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-136=1

* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-136=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-136=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-136=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-136=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-136=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-136=1

* SUSE Linux Enterprise Real Time 15 SP4
zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-136=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-136=1

* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-136=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-136=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-136=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-136=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-136=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-136=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-136=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-136=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-136=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-136=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-136=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-136=1

* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-136=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-136=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-136=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-136=1

## Package List:

* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* Basesystem Module 15-SP5 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* Basesystem Module 15-SP5 (x86_64)
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* Development Tools Module 15-SP5 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Real Time 15 SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Real Time 15 SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Manager Proxy 4.3 (x86_64)
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Manager Proxy 4.3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Manager Server 4.3 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Manager Server 4.3 (x86_64)
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* SUSE Enterprise Storage 7.1 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Enterprise Storage 7.1 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE CaaS Platform 4.0 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* SUSE CaaS Platform 4.0 (noarch)
* pam-doc-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* pam-debugsource-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.66.1
* pam-debugsource-1.3.0-150000.6.66.1
* pam-extra-debuginfo-1.3.0-150000.6.66.1
* pam-extra-1.3.0-150000.6.66.1
* pam-1.3.0-150000.6.66.1
* pam-debuginfo-1.3.0-150000.6.66.1
* openSUSE Leap 15.5 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.66.1
* pam-32bit-debuginfo-1.3.0-150000.6.66.1
* pam-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-1.3.0-150000.6.66.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1
* openSUSE Leap 15.5 (noarch)
* pam-doc-1.3.0-150000.6.66.1

## References:

* https://www.suse.com/security/cve/CVE-2024-22365.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217000
* https://bugzilla.suse.com/show_bug.cgi?id=1218475