openSUSE has issued an advisory on April 17: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S3CBZDTRIQZKAUHHWFBJKJ7PYA7BPARL/
Upstream fix: https://github.com/linux-pam/linux-pam/commit/b3020da7da384d769f27a8713257fbe1001878be
CVE: (none) => CVE-2024-10041Status comment: (none) => Patch available from upstream and openSUSEWhiteboard: (none) => MGA9TOOSource RPM: (none) => pam-1.5.2-9.mga10.src.rpm, pam-1.5.2-5.1.mga9.src.rpm
Different packagers commit this, so assigning it globally.
Assignee: bugsquad => pkg-bugs
Suggested advisory: ======================== The updated packages fix a security vulnerability: libpam vulnerable to read hashed password. (CVE-2024-10041) References: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S3CBZDTRIQZKAUHHWFBJKJ7PYA7BPARL/ ======================== Updated packages in core/updates_testing: ======================== lib(64)pam0-1.5.2-5.2.mga9 lib(64)pam-devel-1.5.2-5.2.mga9 pam-1.5.2-5.2.mga9 pam-doc-1.5.2-5.2.mga9 from SRPM: pam-1.5.2-5.2.mga9.src.rpm
Whiteboard: MGA9TOO => (none)Status comment: Patch available from upstream and openSUSE => (none)Assignee: pkg-bugs => qa-bugsStatus: NEW => ASSIGNEDSource RPM: pam-1.5.2-9.mga10.src.rpm, pam-1.5.2-5.1.mga9.src.rpm => pam-1.5.2-5.1.mga9.src.rpmVersion: Cauldron => 9
Keywords: (none) => advisory
MGA9-64 Plasma Wayland on Compaq H000SB. No installation issues. Ref bugs 32746 and 16212, so I can su to root, start MCC and get access. Good to go.
Whiteboard: (none) => MGA9-64-OKCC: (none) => herman.viaene
Validating.
CC: (none) => andrewsfarm, sysadmin-bugsKeywords: (none) => validated_update
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2025-0149.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED