Permalink
CVE-2025-1390
6.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): HIGH
- Availability impact (A): NONE
pam_cap: Fix potential configuration parsing error
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
Affected products
libcap
- ==2.73;0
Matching in nixpkgs
pkgs.libcaption
Free open-source CEA608 / CEA708 closed-caption encoder/decoder
-
nixos-unstable -
- nixpkgs-unstable 0.7
Package maintainers
-
@LordGrimmauld Sören Bender <soeren@benjos.de>
-
@pschmitt Philipp Schmitt <philipp@schmitt.co>