A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
Workaround:
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:10024 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10027 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10180 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10354 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10357 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10358 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10359 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10361 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10362 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10735 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10823 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9526 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-6020 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2372512 | issue tracking |
http://www.openwall.com/lists/oss-security/2025/06/17/1 |