Summary: | <sys-libs/pam-1.4.0: Local privilege escalation via pam_env with non-default configuration | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system, sam |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2025/06/17/4 | ||
See Also: |
https://bugs.gentoo.org/show_bug.cgi?id=751610 https://bugs.gentoo.org/show_bug.cgi?id=756361 https://bugs.gentoo.org/show_bug.cgi?id=922397 https://bugs.gentoo.org/show_bug.cgi?id=942075 https://bugs.gentoo.org/show_bug.cgi?id=958339 |
||
Whiteboard: | C1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
![]() ![]() ![]() ![]() Note that we don't deviate from upstream defaults wrt pam_env, so Gentoo installs aren't affected by this unless: 1) an old version of sys-libs/pam is installed (the default changed in https://github.com/linux-pam/linux-pam/commit/f83fb5f25263356391d71da595def409e8dd90f7 upstream, which is in >=1.4.0), or 2) the user has set `user_readenv` themselves to enable it With regard to 1), we've issued not one but two GLSAs since 1.4.0: bug 756361 and bug 922397 / bug 942075. With regard to 2), maybe we're not so worried about that, given there's many ways you can inflict issues on yourself by changing settings without reading documentation. I'm inclined to say there's nothing for us to do here. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ce989574f5a86618ea4c389c9e1810c03c8b6a5e commit ce989574f5a86618ea4c389c9e1810c03c8b6a5e Author: Sam James <sam@gentoo.org> AuthorDate: 2025-06-18 04:32:14 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2025-06-18 04:33:24 +0000 sys-fs/udisks: patch CVE-2025-6019 Depend on a fixed version of libblockdev too. Bug: https://bugs.gentoo.org/958338 Bug: https://bugs.gentoo.org/958339 Signed-off-by: Sam James <sam@gentoo.org> .../udisks/files/udisks-2.10.1-CVE-2025-6019.patch | 43 ++++++ sys-fs/udisks/udisks-2.10.1-r4.ebuild | 149 +++++++++++++++++++++ 2 files changed, 192 insertions(+) https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=16072fc78769f65e1a5af36aefeaf4f88f4aefb1 commit 16072fc78769f65e1a5af36aefeaf4f88f4aefb1 Author: Sam James <sam@gentoo.org> AuthorDate: 2025-06-18 04:28:43 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2025-06-18 04:33:18 +0000 sys-libs/libblockdev: patch CVE-2025-6019 Quoting myself on the bug: > This is from https://www.openwall.com/lists/oss-security/2025/06/17/4 but > it's a little complicated in that it relies on a privilege escalation bug > from unprivileged -> polkit 'allow_active' (bug 958338) that we aren't > affected by. > > But nonetheless, supposing such another such LPE exists, this could form > part of a chain from 'allow_active' -> root, so it still matters. My intention is not to rush stabling 3.3.0 as just bumped to it (that commit bumping to 3.3.0 lands in the same push as this) and we were a bit behind before so want to give a little bit of time for any regressions to be reported. Combined with the above, we don't need to hurry s.t. we do it with no time in ~arch at all. Bug: https://bugs.gentoo.org/958338 Bug: https://bugs.gentoo.org/958339 Signed-off-by: Sam James <sam@gentoo.org> .../files/libblockdev-3.3.0-CVE-2025-6019.patch | 24 ++++++++++++++++++++++ sys-libs/libblockdev/libblockdev-3.3.0.ebuild | 1 + 2 files changed, 25 insertions(+) |