[CLSA-2025:1759864577] Fix CVE(s): CVE-2025-6020
Type:
security
Severity:
Important
Release date:
2025-10-07 19:16:21 UTC
Description:
* SECURITY UPDATE: fix privilege escalation in pam_namespace - debian/patches-applied/CVE-2025-6020-pre.patch: prerequisite changes - debian/patches-applied/CVE-2025-6020.patch: enforce proper handling of instance directory symlinks to prevent mounting arbitrary paths - CVE-2025-6020
Updated packages:
  • libpam-cracklib_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_amd64.deb
    sha:55f5556a29b7ff0b2ad0650a0a9e9be6b6dc428e
  • libpam-doc_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_all.deb
    sha:7298f4ed43fbed9a41b0fcdb2efa0fecb587c0e1
  • libpam-modules_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_amd64.deb
    sha:04727872f3c712da156871a1cea596515522dddf
  • libpam-modules-bin_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_amd64.deb
    sha:835dabb7e83bbfc5b805364712650923f1e89749
  • libpam-runtime_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_all.deb
    sha:95ec86dcbdfa00cf2b612e391504c9d3379d7cf1
  • libpam0g_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_amd64.deb
    sha:6ec081c38edc8c5ea080ea9f053f89d99f54f685
  • libpam0g-dev_1.1.8-3.6ubuntu2.18.04.6+tuxcare.els2_amd64.deb
    sha:f1246821dd079aab83753de9e1f5c5cacc00a897
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.