Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4092-1 | libcap2 security update |
EUVD |
EUVD-2025-4857 | The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames. |
Ubuntu USN |
USN-7287-1 | libcap2 vulnerability |
Solution
https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a31... https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/
Workaround
No workaround given by the vendor.
Tue, 18 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 18 Feb 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames. | |
| Title | pam_cap: Fix potential configuration parsing error | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Anolis
Published:
Updated: 2025-02-18T19:28:35.503Z
Reserved: 2025-02-17T06:36:53.706Z
Link: CVE-2025-1390
Updated: 2025-02-18T15:08:41.411Z
Status : Received
Published: 2025-02-18T03:15:10.447
Modified: 2025-02-18T03:15:10.447
Link: CVE-2025-1390
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN