The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 18 Feb 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames. | |
Title | pam_cap: Fix potential configuration parsing error | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Anolis
Published:
Updated: 2025-02-18T19:28:35.503Z
Reserved: 2025-02-17T06:36:53.706Z
Link: CVE-2025-1390

Updated: 2025-02-18T15:08:41.411Z

Status : Received
Published: 2025-02-18T03:15:10.447
Modified: 2025-02-18T03:15:10.447
Link: CVE-2025-1390
