Source: libcap2
Version: 1:2.73-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for libcap2.

CVE-2025-1390[0]:
| The PAM module pam_cap.so of libcap configuration supports group
| names starting with “@”, during actual parsing, configurations not
| starting with “@” are incorrectly recognized as group names. This
| may result in nonintended users being granted an inherited
| capability set, potentially leading to security risks. Attackers can
| exploit this vulnerability to achieve local privilege escalation on
| systems where /etc/security/capability.conf is used to configure
| user inherited privileges by constructing specific usernames.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-1390
    https://www.cve.org/CVERecord?id=CVE-2025-1390
[1] https://bugzilla.openanolis.cn/show_bug.cgi?id=18804
[2] 
https://git.kernel.org/pub/scm/libs/libcap/libcap.git/commit/?id=1ad42b66c3567481cc5fa22fc1ba1556a316d878

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to