diff mbox series

libpam: mark CVE-2025-6018 as not applicable

Message ID 20251021135907.17684-1-anders.heimer@est.tech
State New
Headers show
Series libpam: mark CVE-2025-6018 as not applicable | expand

Commit Message

Anders Heimer Oct. 21, 2025, 1:59 p.m. UTC
CVE-2025-6018 is a local privilege escalation in PAM that requires
`user_readenv=1` to be enabled in the PAM configuration. The default
configuration does not enable reading user environment files (user_readenv
is 0 by default). Hence this vulnerability cannot be exploited using the
default configuration.

Signed-off-by: Anders Heimer <anders.heimer@est.tech>
---
 meta/recipes-extended/pam/libpam_1.7.1.bb | 2 ++
 1 file changed, 2 insertions(+)


base-commit: 416731b8756cd2689055ada2deaff48c7751d3b9

Comments

Peter Marko Oct. 21, 2025, 2:15 p.m. UTC | #1
NVD shows following CPE for this CVE:
cpe:2.3:a:suse:pam-config:1.1.8-24.71.1:*:*:*:*:*:*:*

So we don't need to ignore it as it won't show up in Yocto CVE reports.
Next time I'd search for obsolete CVE_STATUS entries I'd erase this commit.
What's the reason for this patch?

What would be worth investigating is CVE-2024-10041 which is reported for libpam recipe.
Unfortunately not reported on autobuilder as it's not using systemd+pam distro config.

Peter

> -----Original Message-----
> From: openembedded-core@lists.openembedded.org <openembedded-
> core@lists.openembedded.org> On Behalf Of Anders Heimer
> Sent: Tuesday, October 21, 2025 15:59
> To: openembedded-core@lists.openembedded.org
> Cc: Anders Heimer <anders.heimer@est.tech>
> Subject: [OE-core][PATCH] libpam: mark CVE-2025-6018 as not applicable
> 
> CVE-2025-6018 is a local privilege escalation in PAM that requires
> `user_readenv=1` to be enabled in the PAM configuration. The default
> configuration does not enable reading user environment files (user_readenv
> is 0 by default). Hence this vulnerability cannot be exploited using the
> default configuration.
> 
> Signed-off-by: Anders Heimer <anders.heimer@est.tech>
> ---
>  meta/recipes-extended/pam/libpam_1.7.1.bb | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/meta/recipes-extended/pam/libpam_1.7.1.bb b/meta/recipes-
> extended/pam/libpam_1.7.1.bb
> index 8d9ea27028..42b50a8c22 100644
> --- a/meta/recipes-extended/pam/libpam_1.7.1.bb
> +++ b/meta/recipes-extended/pam/libpam_1.7.1.bb
> @@ -26,6 +26,8 @@ SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-
> PAM-${PV}.tar.xz \
> 
>  SRC_URI[sha256sum] =
> "21dbcec6e01dd578f14789eac9024a18941e6f2702a05cf91b28c232eeb26ab0"
> 
> +CVE_STATUS[CVE-2025-6018] = "not-applicable-config: Default PAM config
> does not use user_readenv=1"
> +
>  DEPENDS = "bison-native flex-native libxml2-native virtual/crypt"
> 
>  EXTRA_OEMESON = "-Ddocs=disabled -Dsecuredir=${base_libdir}/security"
> 
> base-commit: 416731b8756cd2689055ada2deaff48c7751d3b9
> --
> 2.34.1
diff mbox series

Patch

diff --git a/meta/recipes-extended/pam/libpam_1.7.1.bb b/meta/recipes-extended/pam/libpam_1.7.1.bb
index 8d9ea27028..42b50a8c22 100644
--- a/meta/recipes-extended/pam/libpam_1.7.1.bb
+++ b/meta/recipes-extended/pam/libpam_1.7.1.bb
@@ -26,6 +26,8 @@  SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \
 
 SRC_URI[sha256sum] = "21dbcec6e01dd578f14789eac9024a18941e6f2702a05cf91b28c232eeb26ab0"
 
+CVE_STATUS[CVE-2025-6018] = "not-applicable-config: Default PAM config does not use user_readenv=1"
+
 DEPENDS = "bison-native flex-native libxml2-native virtual/crypt"
 
 EXTRA_OEMESON = "-Ddocs=disabled -Dsecuredir=${base_libdir}/security"