From 251d8b676e98fee2b2a9dc0dda2caede9f5acb19 Mon Sep 17 00:00:00 2001 From: Anders Heimer Date: Tue, 21 Oct 2025 15:59:22 +0200 Subject: [PATCH] libpam: mark CVE-2025-6018 as not applicable CVE-2025-6018 is a local privilege escalation in PAM that requires `user_readenv=1` to be enabled in the PAM configuration. The default configuration does not enable reading user environment files (user_readenv is 0 by default). Hence this vulnerability cannot be exploited using the default configuration. (From OE-Core rev: 3f2a9ad03326dc87681cf47ed5f73712ebaa624c) Signed-off-by: Anders Heimer Signed-off-by: Steve Sakoman --- meta/recipes-extended/pam/libpam_1.5.3.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-extended/pam/libpam_1.5.3.bb b/meta/recipes-extended/pam/libpam_1.5.3.bb index 4c27767ab1..79a0e9f694 100644 --- a/meta/recipes-extended/pam/libpam_1.5.3.bb +++ b/meta/recipes-extended/pam/libpam_1.5.3.bb @@ -39,6 +39,8 @@ SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \ SRC_URI[sha256sum] = "7ac4b50feee004a9fa88f1dfd2d2fa738a82896763050cd773b3c54b0a818283" +CVE_STATUS[CVE-2025-6018] = "not-applicable-config: Default PAM config does not use user_readenv=1" + DEPENDS = "bison-native flex-native libxml2-native virtual/crypt" EXTRA_OECONF = "--includedir=${includedir}/security \