[CLSA-2025:1759864776] Fix CVE(s): CVE-2025-6020
Type:
security
Severity:
Important
Release date:
2025-10-07 19:19:40 UTC
Description:
* SECURITY UPDATE: fix privilege escalation in pam_namespace - debian/patches-applied/CVE-2025-6020-pre.patch: prerequisite changes - debian/patches-applied/CVE-2025-6020.patch: enforce proper handling of instance directory symlinks to prevent mounting arbitrary paths - CVE-2025-6020
Updated packages:
  • libpam-cracklib_1.1.8-3.2ubuntu2.3+tuxcare.els3_amd64.deb
    sha:cb34cc04237aca9199d2eb1ac5cea4977adbe32b
  • libpam-doc_1.1.8-3.2ubuntu2.3+tuxcare.els3_all.deb
    sha:821f491ee60d039bf60c1ff1f402702d7d7dbaea
  • libpam-modules_1.1.8-3.2ubuntu2.3+tuxcare.els3_amd64.deb
    sha:ea97b37d74610c5903331e0417803a16a44d112c
  • libpam-modules-bin_1.1.8-3.2ubuntu2.3+tuxcare.els3_amd64.deb
    sha:f2f2467e58d782146ffc98c3d38232dbe1b25181
  • libpam-runtime_1.1.8-3.2ubuntu2.3+tuxcare.els3_all.deb
    sha:4704e1ec0d2d5b8b48ef66f359ae1d4dbd71370d
  • libpam0g_1.1.8-3.2ubuntu2.3+tuxcare.els3_amd64.deb
    sha:13e793bc07ccbded9cc13a28b5062fec2c4f9008
  • libpam0g-dev_1.1.8-3.2ubuntu2.3+tuxcare.els3_amd64.deb
    sha:9f0e71a09dcd92be8ca7cec2c2dc2a6a955d8ffc
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.