发布时间: 2025年3月7日
修改时间: 2025年3月7日
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | |
Attack Vector | Local | |
CVSS评分 | N/A | 6.1 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2371 | libcap security update | 2025年4月27日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | libcap | Fixed |
KY3.5.3 | libcap | Fixed |
V6 | libcap | Fixed |