CVE-2025-1390
pam_cap: Fix potential configuration parsing error
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
Tianjia Zhang discovered the libcap2 PAM module pam_cap incorrectly handled parsing group names in the configuration file. This could result in certain users being granted capabilities, contrary to expectations.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-02-17 CVE Reserved
- 2025-02-18 CVE Published
- 2025-02-18 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
- CAPEC-19: Embedding Scripts within Scripts
References (1)
URL | Tag | Source |
---|---|---|
https://bugzilla.openanolis.cn/show_bug.cgi?id=18804 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openanolis Search vendor "Openanolis" | Anolis Os Search vendor "Openanolis" for product "Anolis Os" | * | - |
Affected
|