]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
libpam: mark CVE-2025-6018 as not applicable
authorAnders Heimer <anders.heimer@est.tech>
Tue, 21 Oct 2025 13:59:22 +0000 (15:59 +0200)
committerSteve Sakoman <steve@sakoman.com>
Fri, 24 Oct 2025 13:41:43 +0000 (06:41 -0700)
CVE-2025-6018 is a local privilege escalation in PAM that requires
`user_readenv=1` to be enabled in the PAM configuration. The default
configuration does not enable reading user environment files (user_readenv
is 0 by default). Hence this vulnerability cannot be exploited using the
default configuration.

Signed-off-by: Anders Heimer <anders.heimer@est.tech>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-extended/pam/libpam_1.5.3.bb

index 4c27767ab12ad11aa00bcc2eab2b1957a0949e85..79a0e9f69458698b5fdfddee9ade043c161ec1f2 100644 (file)
@@ -39,6 +39,8 @@ SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \
 
 SRC_URI[sha256sum] = "7ac4b50feee004a9fa88f1dfd2d2fa738a82896763050cd773b3c54b0a818283"
 
+CVE_STATUS[CVE-2025-6018] = "not-applicable-config: Default PAM config does not use user_readenv=1"
+
 DEPENDS = "bison-native flex-native libxml2-native virtual/crypt"
 
 EXTRA_OECONF = "--includedir=${includedir}/security \