CVE-2025-6020

EUVD-2025-19056
A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
Debian logo
Debian Releases
Debian Product
Codename
pam
bookworm
1.5.2-6+deb12u2
fixed
bullseye
vulnerable
bullseye (security)
1.4.0-9+deb11u2
fixed
forky
1.7.0-5
fixed
sid
1.7.0-5
fixed
trixie
1.7.0-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pam
bionic
needs-triage
focal
needs-triage
jammy
Fixed 1.4.0-11ubuntu2.6
released
noble
Fixed 1.5.3-5ubuntu5.4
released
oracular
Fixed 1.5.3-7ubuntu2.3
released
plucky
Fixed 1.5.3-7ubuntu4.3
released
questing
Fixed 1.5.3-7ubuntu6
released
trusty
needs-triage
xenial
needs-triage