We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Reserved 2025-06-11 | Published 2025-07-23 | Updated 2025-07-23 | Assigner redhat2025-06-13: | Reported to Red Hat. |
2025-06-17: | Made public. |
access.redhat.com/security/cve/CVE-2025-6018
bugzilla.redhat.com/show_bug.cgi?id=2372693 (RHBZ#2372693)
bugzilla.suse.com/show_bug.cgi?id=1243226
cdn2.qualys.com/2025/06/17/suse15-pam-udisks-lpe.txt
Support options