Description

A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.

INFO

Published Date :

2025-06-17T12:44:08.646Z

Last Modified :

2026-04-14T13:29:52.760Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-6020 vulnerability.

Vendors Products
Redhat
  • Cert Manager
  • Confidential Compute Attestation
  • Discovery
  • Enterprise Linux
  • Enterprise Linux Eus
  • Insights Proxy
  • Openshift Compliance Operator
  • Openshift Distributed Tracing
  • Openshift Serverless
  • Rhel Aus
  • Rhel E4s
  • Rhel Els
  • Rhel Eus
  • Rhel Tus
  • Rhosemc
  • Webterminal
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-6020.

URL Resource
http://www.openwall.com/lists/oss-security/2025/06/17/1 cve-icon
https://access.redhat.com/errata/RHSA-2025:10024 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10027 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10180 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10354 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10357 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10358 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10359 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10361 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10362 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10735 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:10823 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:11386 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:11487 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:14557 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15099 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15709 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15827 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:15828 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:16524 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17181 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:18219 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:20181 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21885 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:22019 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:9526 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0934 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2025-6020 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2372512 cve-icon cve-icon
https://github.com/linux-pam/linux-pam/security/advisories/GHSA-f9p8-gjr4-j9gx cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2025/09/msg00021.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2025-6020 cve-icon
https://www.cve.org/CVERecord?id=CVE-2025-6020 cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact