CVE-2025-8941

HIGH

Linux-PAM - Privilege Escalation

Title source: llm

Description

A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.

Exploits (1)

github WORKING POC 1 stars
by N3k0t-dev · pythonpoc
https://github.com/N3k0t-dev/PoC-CVE-collection

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 3.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (25)
Red Hat/cert-manager operator for Red Hat OpenShift 1.16 sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323
Red Hat/Compliance Operator 1 sha256:c953e9f9abf9cf25bf65bb3ffdc86ccf49b3e69a1cf3fbb47b6972e421fd6628
Red Hat/Red Hat Discovery 2 sha256:c85cfbcaf7888885e57596b7b8bde3894718cfc33326499b24961a66a62cf083
Red Hat/Red Hat Enterprise Linux 7 Extended Lifecycle Support 0:1.1.8-23.el7_9.2
Red Hat/Red Hat Enterprise Linux 8 0:1.3.1-38.el8_10
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support 0:1.3.1-8.el8_2.2
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:1.3.1-14.el8_4.2
Red Hat/Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On 0:1.3.1-14.el8_4.2
Red Hat/Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 0:1.3.1-16.el8_6.3
Red Hat/Red Hat Enterprise Linux 8.6 Telecommunications Update Service 0:1.3.1-16.el8_6.3
... and 15 more
Published Aug 13, 2025
Tracked Since Feb 18, 2026