{ "summary": { "snap": { "added": [], "removed": [], "diff": [] }, "deb": { "added": [], "removed": [], "diff": [ "libcap2:riscv64", "libcap2-bin", "libpam-cap:riscv64" ] } }, "diff": { "deb": [ { "name": "libcap2:riscv64", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null }, { "name": "libcap2-bin", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null }, { "name": "libpam-cap:riscv64", "from_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.1", "version": "1:2.66-5ubuntu2.1" }, "to_version": { "source_package_name": "libcap2", "source_package_version": "1:2.66-5ubuntu2.2", "version": "1:2.66-5ubuntu2.2" }, "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "launchpad_bugs_fixed": [], "changes": [ { "cves": [ { "cve": "CVE-2025-1390", "url": "https://ubuntu.com/security/CVE-2025-1390", "cve_description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.", "cve_priority": "medium", "cve_public_date": "2025-02-20" } ], "log": [ "", " * SECURITY UPDATE: incorrect group name handling", " - debian/patches/CVE-2025-1390-1.patch: fix potential configuration", " parsing error in pam_cap/pam_cap.c.", " - debian/patches/CVE-2025-1390-2.patch: add a test for bad group prefix", " in pam_cap/sudotest.conf.", " - CVE-2025-1390", "" ], "package": "libcap2", "version": "1:2.66-5ubuntu2.2", "urgency": "medium", "distributions": "noble-security", "launchpad_bugs_fixed": [], "author": "Marc Deslauriers ", "date": "Thu, 20 Feb 2025 10:49:57 -0500" } ], "notes": null } ], "snap": [] }, "added": { "deb": [], "snap": [] }, "removed": { "deb": [], "snap": [] }, "notes": "Changelog diff for Ubuntu 24.04 noble image from daily image serial 20250221 to 20250225", "from_series": "noble", "to_series": "noble", "from_serial": "20250221", "to_serial": "20250225", "from_manifest_filename": "daily_manifest.previous", "to_manifest_filename": "manifest.current" }