First published: Mon May 22 2023(Updated: )
Original Report: Source: libcap2 Version: 1:2.66-3 Severity: important Tags: security upstream X-Debbugs-Cc: carnil, Debian Security Team <team.org> The following vulnerabilities were published for libcap2. <a href="https://access.redhat.com/security/cve/CVE-2023-2603">CVE-2023-2603</a>[1]: | LCAP-CR-23-02 (Large strings can confuse libcap's internal strdup code) [1] <a href="https://security-tracker.debian.org/tracker/CVE-2023-2603">https://security-tracker.debian.org/tracker/CVE-2023-2603</a> <a href="https://www.cve.org/CVERecord?id=CVE-2023-2603">https://www.cve.org/CVERecord?id=CVE-2023-2603</a> fixed in 1:2.66-4
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Libcap2 | <1:2.66-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2209113 is classified as important.
To fix REDHAT-BUG-2209113, update libcap2 to version 1:2.66-4 or higher.
The software affected by REDHAT-BUG-2209113 is libcap2 versions prior to 1:2.66-4.
Currently, there are no publicly known exploits for REDHAT-BUG-2209113.
REDHAT-BUG-2209113 was reported by the Debian Security Team.