USN-7580-1

Source
https://ubuntu.com/security/notices/USN-7580-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7580-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7580-1
Upstream
Related
Published
2025-06-18T16:28:52.960295Z
Modified
2026-01-20T20:40:14.676831Z
Summary
pam vulnerability
Details

Olivier BAL-PETRE discovered that the PAM pamnamespace module incorrectly handled user-controlled paths. In environments where pamnamespace is used, a local attacker could possibly use this issue to escalate their privileges to root.

References

Affected packages

Ubuntu:22.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.4.0-11ubuntu2.6?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0-11ubuntu2.6

Affected versions

1.*

1.3.1-5ubuntu11
1.4.0-10ubuntu1
1.4.0-10ubuntu2
1.4.0-11ubuntu1
1.4.0-11ubuntu2
1.4.0-11ubuntu2.1
1.4.0-11ubuntu2.3
1.4.0-11ubuntu2.4
1.4.0-11ubuntu2.5

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam-cracklib"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam0g"
        },
        {
            "binary_version": "1.4.0-11ubuntu2.6",
            "binary_name": "libpam0g-dev"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-6020",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7580-1.json"

Ubuntu:24.04:LTS / pam

Package

Name
pam
Purl
pkg:deb/ubuntu/pam@1.5.3-5ubuntu5.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.3-5ubuntu5.4

Affected versions

1.*

1.5.2-6ubuntu1
1.5.2-9.1ubuntu1
1.5.2-9.1ubuntu2
1.5.2-9.1ubuntu3
1.5.3-5ubuntu3
1.5.3-5ubuntu4
1.5.3-5ubuntu5
1.5.3-5ubuntu5.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.5.3-5ubuntu5.4",
            "binary_name": "libpam-modules"
        },
        {
            "binary_version": "1.5.3-5ubuntu5.4",
            "binary_name": "libpam-modules-bin"
        },
        {
            "binary_version": "1.5.3-5ubuntu5.4",
            "binary_name": "libpam-runtime"
        },
        {
            "binary_version": "1.5.3-5ubuntu5.4",
            "binary_name": "libpam0g"
        },
        {
            "binary_version": "1.5.3-5ubuntu5.4",
            "binary_name": "libpam0g-dev"
        }
    ]
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-6020",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7580-1.json"