CVE-2025-8941 found in deb/debian/pam@1.7.0
CVE-2025-8941 found in deb/debian/pam@1.7.0
Important
Risk: 0.59 (Low)
CVSS: 7.8
Description
A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
Affected component
The vulnerability is in pkg:deb/debian/pam@1.7.0, found in artifacts pkg:oci/postgresql?repository_url=registry.opencode.de/open-code/oci/postgresql&tag=18-trixie, pkg:oci/postgresql?repository_url=registry.opencode.de/open-code/oci/postgresql&tag=15-trixie, pkg:oci/postgresql?repository_url=registry.opencode.de/open-code/oci/postgresql&tag=17-trixie, pkg:oci/postgresql?repository_url=registry.opencode.de/open-code/oci/postgresql&tag=16-trixie.
Recommended fix
No fix is available.
Additional guidance for mitigating vulnerabilities
Visit our guides on devguard.org
See more details...
Path to component
%%{init: { 'theme':'base', 'themeVariables': {
'primaryColor': '#F3F3F3',
'primaryTextColor': '#0D1117',
'primaryBorderColor': '#999999',
'lineColor': '#999999',
'secondaryColor': '#ffffff',
'tertiaryColor': '#ffffff'
} }}%%
flowchart TD
root(["root"]) --- sbom_CONTAINER_SCANNING(["sbom:CONTAINER_SCANNING"])
sbom_CONTAINER_SCANNING(["sbom:CONTAINER_SCANNING"]) --- debian_13_2(["debian\@13.2"])
debian_13_2(["debian\@13.2"]) --- debian_apt(["debian/apt"])
debian_apt(["debian/apt"]) --- debian_adduser(["debian/adduser"])
debian_adduser(["debian/adduser"]) --- debian_passwd(["debian/passwd"])
debian_passwd(["debian/passwd"]) --- debian_pam(["debian/pam"])
debian_13_2(["debian\@13.2"]) --- debian_gnupg2(["debian/gnupg2"])
debian_gnupg2(["debian/gnupg2"]) --- debian_dirmngr(["debian/dirmngr"])
debian_dirmngr(["debian/dirmngr"]) --- debian_adduser(["debian/adduser"])
debian_13_2(["debian\@13.2"]) --- debian_login(["debian/login"])
debian_login(["debian/login"]) --- debian_pam(["debian/pam"])
debian_13_2(["debian\@13.2"]) --- debian_pam(["debian/pam"])
debian_13_2(["debian\@13.2"]) --- debian_postgresql_18_jit(["debian/postgresql-18-jit"])
debian_postgresql_18_jit(["debian/postgresql-18-jit"]) --- debian_postgresql_18(["debian/postgresql-18"])
debian_postgresql_18(["debian/postgresql-18"]) --- debian_pam(["debian/pam"])
debian_postgresql_18(["debian/postgresql-18"]) --- debian_postgresql_common(["debian/postgresql-common"])
debian_postgresql_common(["debian/postgresql-common"]) --- debian_adduser(["debian/adduser"])
debian_postgresql_common(["debian/postgresql-common"]) --- debian_ssl_cert(["debian/ssl-cert"])
debian_ssl_cert(["debian/ssl-cert"]) --- debian_adduser(["debian/adduser"])
debian_postgresql_18(["debian/postgresql-18"]) --- debian_ssl_cert(["debian/ssl-cert"])
classDef default stroke-width:2px
| Risk Factor | Value | Description |
|---|---|---|
| Vulnerability Depth | 6 |
The vulnerability is in a dependency of a dependency in your project. It is 6 levels deep. |
| EPSS | 0.03 % |
The exploit probability is very low. The vulnerability is unlikely to be exploited in the next 30 days. |
| EXPLOIT | Not available |
We did not find any exploit available. Neither in GitHub repositories nor in the Exploit-Database. There are no script kiddies exploiting this vulnerability. |
| CVSS-BE | 7.8 |
- Exploiting this vulnerability significantly impacts availability. - Exploiting this vulnerability significantly impacts integrity. - Exploiting this vulnerability significantly impacts confidentiality. |
| CVSS-B | 7.8 |
- The vulnerability requires local access to the device to be exploited. - It is easy for an attacker to exploit this vulnerability. - An attacker needs basic access or low-level privileges. - No user interaction is needed for the attacker to exploit this vulnerability. - The impact is confined to the system where the vulnerability exists. - There is a high impact on the confidentiality of the information. - There is a high impact on the integrity of the data. - There is a high impact on the availability of the system. |
More details can be found in DevGuard
Interact with this vulnerability
You can use the following slash commands to interact with this vulnerability:
👍 Reply with this to acknowledge and accept the identified risk.
/accept I accept the risk of this vulnerability, because ...
⚠️ Mark the risk as false positive: Use one of these commands if you believe the reported vulnerability is not actually a valid issue.
/component-not-present The vulnerable component is not included in the artifact.
/vulnerable-code-not-present The component is present, but the vulnerable code is not included or compiled.
/vulnerable-code-not-in-execute-path The vulnerable code exists, but is never executed at runtime.
/vulnerable-code-cannot-be-controlled-by-adversary Built-in protections prevent exploitation of this vulnerability.
/inline-mitigations-already-exist The vulnerable code cannot be controlled or influenced by an attacker.
🔁 Reopen the risk: Use this command to reopen a previously closed or accepted vulnerability.
/reopen ...