Bug 2209113 (CVE-2023-2603) - CVE-2023-2603 libcap: Integer Overflow in _libcap_strdup()
Summary: CVE-2023-2603 libcap: Integer Overflow in _libcap_strdup()
Keywords:
Status: NEW
Alias: CVE-2023-2603
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2210634 2210635 2210636 2210637 2210638 2210639 2235776
Blocks: 2207492
TreeView+ depends on / blocked
 
Reported: 2023-05-22 16:54 UTC by juneau
Modified: 2024-01-24 15:26 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:4524 0 None None None 2023-08-08 08:19:57 UTC
Red Hat Product Errata RHSA-2023:5071 0 None None None 2023-09-12 10:13:05 UTC
Red Hat Product Errata RHSA-2023:7400 0 None None None 2023-11-21 11:41:35 UTC
Red Hat Product Errata RHSA-2024:0436 0 None None None 2024-01-24 15:26:22 UTC

Description juneau 2023-05-22 16:54:28 UTC
Original Report:

Source: libcap2
Version: 1:2.66-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil, Debian Security Team <team.org>

The following vulnerabilities were published for libcap2.

CVE-2023-2603[1]:
| LCAP-CR-23-02 (Large strings can confuse libcap's internal strdup code)

[1] https://security-tracker.debian.org/tracker/CVE-2023-2603
    https://www.cve.org/CVERecord?id=CVE-2023-2603

fixed in 1:2.66-4

Comment 2 Sandipan Roy 2023-05-29 04:15:24 UTC
Created libcap tracking bugs for this issue:

Affects: fedora-37 [bug 2210634]
Affects: fedora-38 [bug 2210635]

Comment 7 errata-xmlrpc 2023-08-08 08:19:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4524 https://access.redhat.com/errata/RHSA-2023:4524

Comment 9 errata-xmlrpc 2023-09-12 10:13:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5071 https://access.redhat.com/errata/RHSA-2023:5071

Comment 10 errata-xmlrpc 2023-11-21 11:41:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:7400 https://access.redhat.com/errata/RHSA-2023:7400

Comment 12 errata-xmlrpc 2024-01-24 15:26:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:0436 https://access.redhat.com/errata/RHSA-2024:0436


Note You need to log in before you can comment on or make changes to this bug.