Description
A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
Reserved 2025-06-11 | Published 2025-06-17 | Updated 2025-07-30 | Assigner
redhatHIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Default status
unaffected
Any version before 1.7.1
affected
Default status
affected
0:1.1.8-23.el7_9.1 before *
unaffected
Default status
affected
0:1.3.1-37.el8_10 before *
unaffected
Default status
affected
0:1.3.1-8.el8_2.1 before *
unaffected
Default status
affected
0:1.3.1-14.el8_4.1 before *
unaffected
Default status
affected
0:1.3.1-16.el8_6.2 before *
unaffected
Default status
affected
0:1.3.1-16.el8_6.2 before *
unaffected
Default status
affected
0:1.3.1-16.el8_6.2 before *
unaffected
Default status
affected
0:1.3.1-26.el8_8.1 before *
unaffected
Default status
affected
0:1.3.1-26.el8_8.1 before *
unaffected
Default status
affected
0:1.5.1-25.el9_6 before *
unaffected
Default status
affected
0:1.5.1-25.el9_6 before *
unaffected
Default status
affected
0:1.5.1-9.el9_0.2 before *
unaffected
Default status
affected
0:1.5.1-15.el9_2.1 before *
unaffected
Default status
affected
0:1.5.1-24.el9_4 before *
unaffected
Default status
affected
7.13.5-4.1752066672 before *
unaffected
Default status
affected
7.13.5-4.1752065732 before *
unaffected
Default status
affected
7.13.5-4.1752065732 before *
unaffected
Default status
affected
7.13.5-3.1752065737 before *
unaffected
Default status
affected
7.13.5-4.1752065731 before *
unaffected
Default status
affected
7.13.5-25 before *
unaffected
Default status
affected
7.13.5-4.1752065736 before *
unaffected
Default status
affected
7.13.5-2.1752065733 before *
unaffected
Default status
affected
7.13.5-4.1752065755 before *
unaffected
Default status
affected
sha256:c499a099e03c7488ffe50529a34723ade191a89fcfc59d1f0edd01db2b579ca3 before *
unaffected
Default status
affected
sha256:40535c017d2730645c57c44b32b4df1613585cc19c052fe472ccbf543a659c42 before *
unaffected
Default status
affected
sha256:643b9297fe6bf515d142ad8c857d279aa47854aecd0c9cdb90061185ac78987a before *
unaffected
Default status
affected
sha256:281913677308b5a7f0f834161ca1c1cf22e2686616f60057ac8ae61627f66861 before *
unaffected
Default status
affected
sha256:34851d4dd94a887b27d0937a1238d09ac370b4ec06382fe880796dac86c4aa3e before *
unaffected
Default status
affected
sha256:3d281c9d7fe151c35605aac57a95fec699d20ecea6f4a5ea5b8cdc26a8808695 before *
unaffected
Default status
affected
sha256:2a37885dbd9735167854119a546f9ce1b37454a2b57d283fbd8da890c01db767 before *
unaffected
Default status
affected
sha256:8f2da1e0fc45a36cffbe91f9a1c4449eb0c71671865b7194951ad727c9f7b064 before *
unaffected
Default status
affected
sha256:9eaae087bccf2cedfea26d1c0235cfbbe227f9b8f1eda67dc0b33441e319eb85 before *
unaffected
Default status
affected
sha256:54c5403a8a9e0300233e75a04318013e9dbe3d894be691927d27dc2fe53fddc0 before *
unaffected
Timeline
2025-06-12: | Reported to Red Hat. |
2025-06-17: | Made public. |
Credits
Red Hat would like to thank Olivier BAL-PETRE (ANSSI - French Cybersecurity Agency) for reporting this issue.
References
access.redhat.com/errata/RHSA-2025:10024 (RHSA-2025:10024) vendor-advisory
access.redhat.com/errata/RHSA-2025:10027 (RHSA-2025:10027) vendor-advisory
access.redhat.com/errata/RHSA-2025:10180 (RHSA-2025:10180) vendor-advisory
access.redhat.com/errata/RHSA-2025:10354 (RHSA-2025:10354) vendor-advisory
access.redhat.com/errata/RHSA-2025:10357 (RHSA-2025:10357) vendor-advisory
access.redhat.com/errata/RHSA-2025:10358 (RHSA-2025:10358) vendor-advisory
access.redhat.com/errata/RHSA-2025:10359 (RHSA-2025:10359) vendor-advisory
access.redhat.com/errata/RHSA-2025:10361 (RHSA-2025:10361) vendor-advisory
access.redhat.com/errata/RHSA-2025:10362 (RHSA-2025:10362) vendor-advisory
access.redhat.com/errata/RHSA-2025:10735 (RHSA-2025:10735) vendor-advisory
access.redhat.com/errata/RHSA-2025:10823 (RHSA-2025:10823) vendor-advisory
access.redhat.com/errata/RHSA-2025:11386 (RHSA-2025:11386) vendor-advisory
access.redhat.com/errata/RHSA-2025:11487 (RHSA-2025:11487) vendor-advisory
access.redhat.com/errata/RHSA-2025:9526 (RHSA-2025:9526) vendor-advisory
access.redhat.com/security/cve/CVE-2025-6020 vdb-entry
bugzilla.redhat.com/show_bug.cgi?id=2372512 (RHBZ#2372512) issue-tracking
cve.org (CVE-2025-6020)
nvd.nist.gov (CVE-2025-6020)
Download JSON