CVE-2025-1390
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
- T
Tim Bastin detected CVE-2025-1390 with a risk of 2.8
System updated the risk assessment to 1.4
System recalculated raw risk assessment
System updated the risk assessment from 1.4 to 0.7
System recalculated raw risk assessment
System updated the risk assessment from 0.7 to 1.4
System recalculated raw risk assessment
System updated the risk assessment from 1.4 to 2.8
System recalculated raw risk assessment
System updated the risk assessment from 2.8 to 1.4
System recalculated raw risk assessment
System detected CVE-2025-1390 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2025-1390
System detected CVE-2025-1390 with a risk of 1.4
System removed scanner: container-scanning
System detected CVE-2025-1390 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2025-1390
System detected CVE-2025-1390 with a risk of 1.4
- T
Tim Bastin fixed CVE-2025-1390
System updated the risk assessment from 1.4 to 2.8
System recalculated raw risk assessment
Reopen this vulnerability
Affected component
debian/libcap2