First published: Mon Aug 28 2023(Updated: )
It was discovered that Libqb incorrectly handled certain messages. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/doxygen2man | <2.0.6-2ubuntu0.1 | 2.0.6-2ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/libqb-tools | <2.0.6-2ubuntu0.1 | 2.0.6-2ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/libqb100 | <2.0.6-2ubuntu0.1 | 2.0.6-2ubuntu0.1 |
=23.04 | ||
All of | ||
ubuntu/doxygen2man | <2.0.4-1ubuntu0.2 | 2.0.4-1ubuntu0.2 |
=22.04 | ||
All of | ||
ubuntu/libqb-tools | <2.0.4-1ubuntu0.2 | 2.0.4-1ubuntu0.2 |
=22.04 | ||
All of | ||
ubuntu/libqb100 | <2.0.4-1ubuntu0.2 | 2.0.4-1ubuntu0.2 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Libqb vulnerability is USN-6308-1.
This vulnerability could allow an attacker to cause a crash or execute arbitrary code.
Versions 2.0.6-2ubuntu0.1 and 2.0.4-1ubuntu0.2 of doxygen2man, libqb-tools, and libqb100 on Ubuntu versions 22.04 and 23.04 are affected by this vulnerability.
To fix this vulnerability, update to version 2.0.6-2ubuntu0.1 of the affected software packages on Ubuntu versions 22.04 and 23.04.
You can find more information about this vulnerability at the following references: [CVE-2023-39976](https://ubuntu.com/security/CVE-2023-39976), [2.0.6-2ubuntu0.1](https://launchpad.net/ubuntu/+source/libqb/2.0.6-2ubuntu0.1), [2.0.4-1ubuntu0.2](https://launchpad.net/ubuntu/+source/libqb/2.0.4-1ubuntu0.2).