First published: Mon May 22 2023(Updated: )
Original Report: Source: libcap2 Version: 1:2.66-3 Severity: important Tags: security upstream X-Debbugs-Cc: carnil, Debian Security Team <team.org> The following vulnerabilities were published for libcap2. <a href="https://access.redhat.com/security/cve/CVE-2023-2602">CVE-2023-2602</a>[0]: | LCAP-CR-23-01 (Correct the check of pthread_create()'s return value) [0] <a href="https://security-tracker.debian.org/tracker/CVE-2023-2602">https://security-tracker.debian.org/tracker/CVE-2023-2602</a> <a href="https://www.cve.org/CVERecord?id=CVE-2023-2602">https://www.cve.org/CVERecord?id=CVE-2023-2602</a> fixed in 1:2.66-4
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Libcap2 | <1:2.66-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2209114 is classified as important.
REDHAT-BUG-2209114 indicates vulnerabilities in the libcap2 version 1:2.66-3, which may lead to potential security risks.
To mitigate REDHAT-BUG-2209114, users should upgrade their libcap2 package to version 1:2.66-4 or later.
Yes, a patch is available as part of the update to libcap2 version 1:2.66-4.
For more information regarding REDHAT-BUG-2209114, you can contact the Debian Security Team.