EGI SVG Advisories


Advisory-EGI-SVG-2025-15

HIGH risk pam_namespace vulnerabilities

Date: 2025-09-03 Updated: 2025-10-08

HIGH risk vulnerabilities concerning pam_namespace which may allow privilege escalation.

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2025-15

CVE ID : CVE-2025-6020, CVE-2025-8941

CVSS Score : 7.8 [R 1], [R 2]

ACTIONS REQUIRED/RECOMMENDED

Sites using pam_namespace are recommended to urgently apply vendor updates using the references below as soon as patches are available for the distrubution they run.

Sites should be aware that if a public exploit is released which allows easy root access in the EGI infrastructure, these vulnerabilities are likely to be elevated to ‘CRITICAL’ risk and sites will then be required to patch or have mitigation in place within 7 days or risk suspension.

MORE INFORMATION

Note that CVE-2025-8941 is due to a potentially RedHat-specific, incomplete fix for CVE-2025-6020.

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2025-15

https://advisories.egi.eu/Advisory-SVG-CVE-2025-6020

https://advisories.egi.eu/Advisory-SVG-CVE-2025-8941

Minor updates may be made without re-distribution to the sites.

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. -----------------------------

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

SVG was alerted to this vulnerability by Mischa Salle.