CVE-2025-6020
BaseFortify
Publication date: 2025-06-17
Last updated on: 2026-03-17
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-6020 is a vulnerability in the Linux-PAM system, specifically in the pam_namespace module. This module improperly accesses user-controlled file system paths without sufficient security protections. Because of this, a local attacker can exploit symbolic link (symlink) attacks and race conditions to escalate their privileges to root, effectively gaining full control over the system. [1]
How can this vulnerability impact me? :
This vulnerability allows a local user to escalate their privileges to root, which means an attacker with limited access can gain full administrative control over the affected Linux system. This can lead to unauthorized access, modification, or destruction of data, installation of malicious software, and complete compromise of system integrity and confidentiality. [1]