Debian Package Tracker
Register | Log in
Subscribe

pam

Choose email to subscribe with

general
  • source: pam (main)
  • version: 1.7.0-5
  • maintainer: Sam Hartman (DMD)
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.4.0-9+deb11u1
  • o-o-sec: 1.4.0-9+deb11u2
  • oldstable: 1.5.2-6+deb12u1
  • old-p-u: 1.5.2-6+deb12u2
  • stable: 1.7.0-5
  • testing: 1.7.0-5
  • unstable: 1.7.0-5
versioned links
  • 1.4.0-9+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.0-9+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.2-6+deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.2-6+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.0-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libpam-doc (4 bugs: 0, 0, 4, 0)
  • libpam-modules (49 bugs: 0, 29, 20, 0)
  • libpam-modules-bin
  • libpam-runtime (25 bugs: 0, 15, 10, 0)
  • libpam0g (7 bugs: 0, 3, 4, 0)
  • libpam0g-dev (2 bugs: 0, 2, 0, 0)
action needed
A new upstream version is available: 1.7.1 high
A new upstream version 1.7.1 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2025-12-23 13:00
Failed to analyze the VCS repository. Please troubleshoot and fix the issue. high
vcswatch reports that there is an error with this package's VCS, or the debian/changelog file inside it. Please check the error shown below and try to fix it. You might have to update the VCS URL in the debian/control file to point to the correct repository.

remote: GitLab is not responding fatal: unable to access 'https://salsa.debian.org/vorlon/pam.git/': The requested URL returned error: 502
Created: 2025-02-14 Last update: 2025-12-23 10:48
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2025-8941: A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Created: 2025-08-14 Last update: 2025-09-21 14:01
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-8941: A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Created: 2025-08-14 Last update: 2025-09-21 14:01
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-8941: A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Created: 2025-08-14 Last update: 2025-09-21 14:01
2 security issues in bullseye high

There are 2 open security issues in bullseye.

1 important issue:
  • CVE-2025-8941: A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
1 ignored issue:
  • CVE-2024-10041: A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
Created: 2025-06-17 Last update: 2025-09-21 14:01
2 security issues in bookworm high

There are 2 open security issues in bookworm.

1 important issue:
  • CVE-2025-8941: A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
1 ignored issue:
  • CVE-2024-10041: A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications.
2 issues that should be fixed with the next stable update:
  • CVE-2025-6020: A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
  • CVE-2024-22365: linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
Created: 2024-01-18 Last update: 2025-09-21 14:01
13 bugs tagged patch in the BTS normal
The BTS contains patches fixing 13 bugs (14 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-12-23 18:02
Depends on packages which need a new maintainer normal
The packages that pam depends on which need a new maintainer are:
  • db-defaults (#1055344)
    • Build-Depends: libdb-dev
  • docbook-xsl (#802370)
    • Build-Depends-Indep: docbook-xsl-ns
  • docbook5-xml (#802377)
    • Build-Depends-Indep: docbook5-xml
Created: 2023-09-01 Last update: 2025-12-23 17:30
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-02-04 Last update: 2025-12-23 14:00
5 open merge requests in Salsa normal
There are 5 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-11-08 14:00
lintian reports 21 warnings normal
Lintian reports 21 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-02-11 Last update: 2025-06-30 04:33
debian/patches: 23 patches to forward upstream low

Among the 23 debian patches available in version 1.7.0-5 of the package, we noticed the following issues:

  • 23 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-02-28 Last update: 2025-06-30 11:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2024-04-07 Last update: 2025-06-29 23:27
news
[rss feed]
  • [2025-10-19] Accepted pam 1.5.2-6+deb12u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Sam Hartman)
  • [2025-09-21] Accepted pam 1.4.0-9+deb11u2 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-07-07] pam 1.7.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-06-29] Accepted pam 1.7.0-5 (source) into unstable (Sam Hartman)
  • [2025-06-26] Accepted pam 1.7.0-4 (source) into experimental (Sam Hartman)
  • [2025-02-15] pam 1.7.0-3 MIGRATED to testing (Debian testing watch)
  • [2025-02-11] Accepted pam 1.7.0-3 (source) into unstable (Sam Hartman)
  • [2025-02-04] pam 1.7.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-01-30] Accepted pam 1.7.0-2 (source) into unstable (Sam Hartman)
  • [2025-01-17] Accepted pam 1.7.0-1 (source) into experimental (Sam Hartman)
  • [2024-05-03] pam 1.5.3-7 MIGRATED to testing (Debian testing watch)
  • [2024-04-08] Accepted pam 1.5.3-7 (source) into unstable (Sam Hartman)
  • [2024-02-29] Accepted pam 1.5.3-6 (source) into unstable (Steve Langasek)
  • [2024-02-29] Accepted pam 1.5.3-5 (source) into unstable (Sam Hartman)
  • [2024-02-28] Accepted pam 1.5.3-4 (source) into unstable (Sam Hartman)
  • [2024-02-06] Accepted pam 1.5.3-3 (source) into experimental (Helmut Grohne) (signed by: Sam Hartman)
  • [2024-02-02] Accepted pam 1.5.3-2 (source all amd64) into experimental (Sam Hartman)
  • [2024-01-16] Accepted pam 1.5.3-1 (source) into experimental (Sam Hartman)
  • [2023-10-27] pam 1.5.2-9.1 MIGRATED to testing (Debian testing watch)
  • [2023-10-24] Accepted pam 1.5.2-9.1 (source) into unstable (Helmut Grohne)
  • [2023-10-24] Accepted pam 1.5.2-9 (source) into unstable (Sam Hartman)
  • [2023-10-24] Accepted pam 1.5.2-8 (source) into unstable (Helmut Grohne) (signed by: Sam Hartman)
  • [2023-09-23] Accepted pam 1.5.2-6+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Sam Hartman)
  • [2023-08-19] pam 1.5.2-7 MIGRATED to testing (Debian testing watch)
  • [2023-08-16] Accepted pam 1.5.2-7 (source) into unstable (Sam Hartman)
  • [2023-01-14] pam 1.5.2-6 MIGRATED to testing (Debian testing watch)
  • [2023-01-04] Accepted pam 1.5.2-6 (source) into unstable (Sam Hartman)
  • [2022-10-12] pam 1.5.2-5 MIGRATED to testing (Debian testing watch)
  • [2022-10-06] Accepted pam 1.5.2-5 (source) into unstable (Steve Langasek)
  • [2022-10-06] Accepted pam 1.5.2-4 (source) into unstable (Steve Langasek)
  • 1
  • 2
bugs [bug history graph]
  • all: 102 107
  • RC: 2
  • I&N: 55 59
  • M&W: 44 45
  • F&P: 1
  • patch: 13 14
links
  • homepage
  • lintian (0, 21)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (87, 58)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.7.0-5ubuntu2
  • 75 bugs (6 patches)
  • patches for 1.7.0-5ubuntu2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing