Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:10027 - Security Advisory
Issued:
2025-07-01
Updated:
2025-07-01

RHSA-2025:10027 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: pam security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for pam is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.

Security Fix(es):

  • linux-pam: Linux-pam directory Traversal (CVE-2025-6020)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 2372512 - CVE-2025-6020 linux-pam: Linux-pam directory Traversal

CVEs

  • CVE-2025-6020

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 8

SRPM
pam-1.3.1-37.el8_10.src.rpm SHA-256: 39e51801a9112d6e5ad658823ce492ae264eb767559c0036ff68545bdb49de99
x86_64
pam-1.3.1-37.el8_10.i686.rpm SHA-256: 12fe55c4fbeeb2f8d27af18c81e769763d7940542c29cb4b197428e361de0ca0
pam-1.3.1-37.el8_10.x86_64.rpm SHA-256: d7f579aabd177461ce0c3ffe08fa2881f2f6f623ac2379c06f68fd69e5a2a2e4
pam-debuginfo-1.3.1-37.el8_10.i686.rpm SHA-256: e7029749748555a65f1e211feb437fb950217a3e0aef2d7ffa18be0776e114d3
pam-debuginfo-1.3.1-37.el8_10.x86_64.rpm SHA-256: c6e15a8bdb7a286e1856d5529f47995e547965d1fcbf8150c0ac1f4c16b961b1
pam-debugsource-1.3.1-37.el8_10.i686.rpm SHA-256: 85ecb9a2dc9f6a6db8959d982527e7a8dfe30c5ec2fb601d2ef50a7b556d5778
pam-debugsource-1.3.1-37.el8_10.x86_64.rpm SHA-256: 1e0b2bbb7bfa9f6c95cb6461cb44c169aed6a92b897a38dfd692c63daa25e26a
pam-devel-1.3.1-37.el8_10.i686.rpm SHA-256: d9cea4d70323b4e0264002bcdb082aa639ad6d7fbaffc779ccd1a3c731e380d8
pam-devel-1.3.1-37.el8_10.x86_64.rpm SHA-256: aa8f57af6e24d47c97f7a0c293a9e37f6d927d57727ebd998912c362c1ac83dc

Red Hat Enterprise Linux for IBM z Systems 8

SRPM
pam-1.3.1-37.el8_10.src.rpm SHA-256: 39e51801a9112d6e5ad658823ce492ae264eb767559c0036ff68545bdb49de99
s390x
pam-1.3.1-37.el8_10.s390x.rpm SHA-256: 3c3251607e0425357688dfbbca02a686e1ceb28632c80e4ec77a6420fdbef1ef
pam-debuginfo-1.3.1-37.el8_10.s390x.rpm SHA-256: 36de3b633e9418576c766181c37d1ad946a9b5b31d250e4d351200318dba753b
pam-debugsource-1.3.1-37.el8_10.s390x.rpm SHA-256: 08aa877d41e0c81ec9c1fea6287dccab600f031d751c9862ddda2b8aa385aa3f
pam-devel-1.3.1-37.el8_10.s390x.rpm SHA-256: 5e240cb8c7a3c50e1bca6fa45c5012cc16449a96a4b34533aa11ebaaa2010fcd

Red Hat Enterprise Linux for Power, little endian 8

SRPM
pam-1.3.1-37.el8_10.src.rpm SHA-256: 39e51801a9112d6e5ad658823ce492ae264eb767559c0036ff68545bdb49de99
ppc64le
pam-1.3.1-37.el8_10.ppc64le.rpm SHA-256: 4744edc98975ced9aced8ea1a07f9a05d4d1e514b907f387c94276e0a36d90fe
pam-debuginfo-1.3.1-37.el8_10.ppc64le.rpm SHA-256: a6e1efd148f99d8c963e58431ea736083583b46d61c8bf45f2c8977397459eb7
pam-debugsource-1.3.1-37.el8_10.ppc64le.rpm SHA-256: 623143e2fa3f0b2b28801e9acf79af877ec35edae9980828d7b85cc02ce6d3d0
pam-devel-1.3.1-37.el8_10.ppc64le.rpm SHA-256: 212606dc45ef52712187c58753bf001464157b9c9b7d509094f1de71c2ed558f

Red Hat Enterprise Linux for ARM 64 8

SRPM
pam-1.3.1-37.el8_10.src.rpm SHA-256: 39e51801a9112d6e5ad658823ce492ae264eb767559c0036ff68545bdb49de99
aarch64
pam-1.3.1-37.el8_10.aarch64.rpm SHA-256: b82254befae8f787d1409ca012673ae27d473263a11b0bf14ad063e8fee65bdf
pam-debuginfo-1.3.1-37.el8_10.aarch64.rpm SHA-256: c0006462749bc6bd0489fa1e2e39018129bc5da758843bdda01b5e052f3e9dd7
pam-debugsource-1.3.1-37.el8_10.aarch64.rpm SHA-256: 3e45dd56aad62eed16acfdc4089a3d0f304158a7117c62712df58605b66ef3ff
pam-devel-1.3.1-37.el8_10.aarch64.rpm SHA-256: c73194e32f98d0bd63e6a22d5e85f8ee71cd465e6c477241256579ab30e5e693

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility