CVE-2025-8941 (CNNVD-202508-1387)
HIGH
中文标题:
Linux-pam 路径遍历漏洞
英文标题:
Linux-pam: incomplete fix for cve-2025-6020
CVSS分数:
7.8
发布时间:
2025-08-13 14:42:37
漏洞类型:
路径遍历
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
Linux-pam是美国Linux基金会的一款用于Linux的支持插拔式的系统身份验证软件。 Linux-pam存在路径遍历漏洞,该漏洞源于pam_namespace模块处理用户控制路径不当,可能导致权限提升。
英文描述:
A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
CWE类型:
CWE-22
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support | - | - | - |
cpe:/o:redhat:rhel_els:7
|
| Red Hat | Red Hat Enterprise Linux 8 | 8 | - | - |
cpe:/o:redhat:enterprise_linux:8::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | 8.2 | - | - |
cpe:/o:redhat:rhel_aus:8.2::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | 8.4 | - | - |
cpe:/o:redhat:rhel_aus:8.4::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | 8.4 | - | - |
cpe:/o:redhat:rhel_aus:8.4::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | 8.6 | - | - |
cpe:/o:redhat:rhel_aus:8.6::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | 8.6 | - | - |
cpe:/o:redhat:rhel_aus:8.6::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | 8.6 | - | - |
cpe:/o:redhat:rhel_aus:8.6::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.8 Telecommunications Update Service | 8.8 | - | - |
cpe:/o:redhat:rhel_tus:8.8::baseos
|
| Red Hat | Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | 8.8 | - | - |
cpe:/o:redhat:rhel_tus:8.8::baseos
|
| Red Hat | Red Hat Enterprise Linux 9 | 9 | - | - |
cpe:/o:redhat:enterprise_linux:9::baseos
|
| Red Hat | Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions | 9.0 | - | - |
cpe:/a:redhat:rhel_e4s:9.0::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | 9.2 | - | - |
cpe:/a:redhat:rhel_e4s:9.2::appstream
|
| Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | 9.4 | - | - |
cpe:/a:redhat:rhel_eus:9.4::appstream
|
| Red Hat | Red Hat Web Terminal 1.11 on RHEL 9 | 1.11 | - | - |
cpe:/a:redhat:webterminal:1.11::el9
|
| Red Hat | Red Hat Web Terminal 1.12 on RHEL 9 | 1.12 | - | - |
cpe:/a:redhat:webterminal:1.12::el9
|
| Red Hat | cert-manager operator for Red Hat OpenShift 1.16 | 1.16 | - | - |
cpe:/a:redhat:cert_manager:1.16::el9
|
| Red Hat | Red Hat Discovery 2 | 2 | - | - |
cpe:/a:redhat:discovery:2::el9
|
| Red Hat | Red Hat Insights proxy 1.5 | 1.5 | - | - |
cpe:/a:redhat:insights_proxy:1.5::el9
|
| Red Hat | Red Hat OpenShift sandboxed containers 1.1 | 1.10 | - | - |
cpe:/a:redhat:confidential_compute_attestation:1.10::el9
|
| Red Hat | Compliance Operator 1 | 1 | - | - |
cpe:/a:redhat:openshift_compliance_operator:1::el9
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2025:14557
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15099
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15100
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15101
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15102
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15103
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15104
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15105
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15106
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15107
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15709
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15827
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:15828
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:16524
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:17181
vendor-advisory
cve.org
访问
cve.org
RHSA-2025:18219
vendor-advisory
cve.org
访问
cve.org
无标题
vdb-entry
cve.org
访问
cve.org
RHBZ#2388220
issue-tracking
cve.org
访问
cve.org
RHSA-2025:21885
vendor-advisory
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
HIGH
7.8
CVSS向量:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-08-13 14:42:37
修改时间:
2025-11-06 22:03:56
创建时间:
2025-11-11 15:40:53
更新时间:
2026-01-12 02:28:16
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-8941 |
2025-11-11 15:23:37 | 2025-11-11 07:40:53 |
| NVD | nvd_CVE-2025-8941 |
2025-11-11 15:00:59 | 2025-11-11 07:48:40 |
| CNNVD | cnnvd_CNNVD-202508-1387 |
2025-11-11 15:13:01 | 2025-11-11 08:00:04 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v4
CVE
2026-01-12 02:12:34
affected_products_count: 20 → 21; references_count: 18 → 19
查看详细变更
- affected_products_count: 20 -> 21
- references_count: 18 -> 19
v3
CNNVD
2025-11-11 16:00:04
vulnerability_type: 未提取 → 路径遍历; cnnvd_id: 未提取 → CNNVD-202508-1387; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-202508-1387
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:48:40
affected_products_count: 25 → 20; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 25 -> 20
- data_sources: ['cve'] -> ['cve', 'nvd']