First published: Mon May 22 2023(Updated: )
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libcap Project Libcap | =2.66 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/libcap2 | <=1:2.44-1 | 1:2.66-4 1:2.66-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2602 is a vulnerability found in the pthread_create() function in libcap that can allow a malicious actor to exhaust the process memory.
CVE-2023-2602 has a severity level of low with a severity value of 3.3.
The affected software includes libcap2 (version 1:2.44-1), Libcap Project Libcap (version 2.66), Redhat Enterprise Linux (versions 6.0, 7.0, 8.0, 9.0), Debian Debian Linux (versions 10.0, 11.0, 12.0), and Fedoraproject Fedora (versions 37, 38).
To fix CVE-2023-2602, update the libcap2 package to versions 1:2.25-2 or 1:2.66-4.
You can find more information about CVE-2023-2602 on the following pages: Red Hat Security Tracker, Debian Security Tracker, and CVE website.