漏洞标题
pam_cap:修复潜在的配置解析错误
漏洞描述信息
libcap配置中的PAM模块pam_cap.so支持以“@”开头的组名,在实际解析过程中,不以“@”开头的配置被错误地识别为组名。这可能导致非预期用户获得继承的能力集,从而引发安全风险。攻击者可以利用此漏洞,在使用/etc/security/capability.conf配置用户继承权限的系统上,通过构造特定用户名实现本地权限提升。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞类别
特权管理不恰当
漏洞标题
pam_cap: Fix potential configuration parsing error
漏洞描述信息
The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
漏洞类别
访问控制不恰当