pam_namespace: fix potential privilege escalation

Resolves: CVE-2025-6020 and RHEL-96724

Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
This commit is contained in:
Iker Pedrosa 2025-08-06 11:46:32 +02:00
parent 6a608c05dc
commit 0a3971288a
2 changed files with 1069 additions and 169 deletions

File diff suppressed because it is too large Load Diff

View File

@ -3,7 +3,7 @@
Summary: An extensible library which provides authentication for applications Summary: An extensible library which provides authentication for applications
Name: pam Name: pam
Version: 1.3.1 Version: 1.3.1
Release: 37%{?dist} Release: 38%{?dist}
# The library is BSD licensed with option to relicense as GPLv2+ # The library is BSD licensed with option to relicense as GPLv2+
# - this option is redundant as the BSD license allows that anyway. # - this option is redundant as the BSD license allows that anyway.
# pam_timestamp, pam_loginuid, and pam_console modules are GPLv2+. # pam_timestamp, pam_loginuid, and pam_console modules are GPLv2+.
@ -125,7 +125,7 @@ Patch74: pam-1.3.1-libpam-support-long-lines.patch
Patch75: pam-1.3.1-pam-access-resolve-ip.patch Patch75: pam-1.3.1-pam-access-resolve-ip.patch
# https://github.com/linux-pam/linux-pam/commit/10b80543807e3fc5af5f8bcfd8bb6e219bb3cecc # https://github.com/linux-pam/linux-pam/commit/10b80543807e3fc5af5f8bcfd8bb6e219bb3cecc
Patch76: pam-1.3.1-pam-inline-pam-asprintf.patch Patch76: pam-1.3.1-pam-inline-pam-asprintf.patch
# Available upstream # https://github.com/linux-pam/linux-pam/commit/475bd60c552b98c7eddb3270b0b4196847c0072e
Patch77: pam-1.3.1-pam-namespace-rebase.patch Patch77: pam-1.3.1-pam-namespace-rebase.patch
%define _pamlibdir %{_libdir} %define _pamlibdir %{_libdir}
@ -505,7 +505,7 @@ done
%doc doc/specs/rfc86.0.txt %doc doc/specs/rfc86.0.txt
%changelog %changelog
* Mon Jun 16 2025 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-37 * Wed Aug 6 2025 Iker Pedrosa <ipedrosa@redhat.com> - 1.3.1-38
- pam_namespace: fix potential privilege escalation. - pam_namespace: fix potential privilege escalation.
Resolves: CVE-2025-6020 and RHEL-96724 Resolves: CVE-2025-6020 and RHEL-96724