CVE-2025-1390

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-1390
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1390.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-1390
Related
Published
2025-02-18T03:15:10Z
Modified
2025-03-26T16:57:41.356243Z
Summary
[none]
Details

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.

References

Affected packages

Debian:11 / libcap2

Package

Name
libcap2
Purl
pkg:deb/debian/libcap2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.44-1+deb11u1

Affected versions

1:2.*

1:2.44-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libcap2

Package

Name
libcap2
Purl
pkg:deb/debian/libcap2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:2.*

1:2.66-4
1:2.66-5
1:2.73-1
1:2.73-2
1:2.73-3
1:2.73-4
1:2.75-1
1:2.75-2
1:2.75-3
1:2.75-4~exp1
1:2.75-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libcap2

Package

Name
libcap2
Purl
pkg:deb/debian/libcap2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.73-4

Affected versions

1:2.*

1:2.66-4
1:2.66-5
1:2.73-1
1:2.73-2
1:2.73-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}