PoC released for Linux-PAM vulnerability enabling root escalation

A proof-of-concept exploit has been released for CVE-2025-8941, a high-severity flaw in Linux-PAM's pam_namespace module. The vulnerability allows local attackers with low privileges to gain root access through race conditions and symlink manipulation. Security experts urge immediate patching to prevent system compromise.

The vulnerability, tracked as CVE-2025-8941, affects the Pluggable Authentication Modules (PAM) used in various Linux distributions. Discovered in the pam_namespace module, which manages per-user namespaces, the flaw arises from improper handling of user-controlled paths during namespace setup. Rated 7.8 high on the CVSS scale, it requires local access and user interaction but demands only low privileges from the attacker.

Attackers can exploit a race condition during folder creation by creating symlinks that redirect PAM's directory creation process to sensitive system locations. When timed correctly, this enables the creation or modification of files with root authority, leading to full system control, potential data leakage, and the ability to disable security configurations or install backdoors.

The proof-of-concept, published on October 20, 2025, demonstrates how filesystem timing can be manipulated for root privilege escalation. This heightens risks in shared systems, multi-user servers, and development environments, where local access is common. Although the attack complexity is moderate, the consequences for unpatched systems are severe, including complete compromise or exposure of confidential data.

All Linux-PAM versions before the latest vendor patch are vulnerable. Administrators should update through their distribution's security channels immediately. Temporary mitigations include monitoring for unusual symlink creation, deploying host intrusion detection systems, restricting write permissions in temporary directories, and isolating unprivileged users. However, only the official patch fully resolves the issue, emphasizing the need for robust patch management against subtle filesystem vulnerabilities.

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए एनालिटिक्स के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें