libcap2: CVE-2023-2602 CVE-2023-2603

Related Vulnerabilities: CVE-2023-2602   CVE-2023-2603  

Debian Bug report logs - #1036114
libcap2: CVE-2023-2602 CVE-2023-2603

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Mon, 15 May 2023 17:48:02 UTC

Severity: important

Tags: security, upstream

Found in version libcap2/1:2.66-3

Fixed in version libcap2/1:2.66-4

Done: Christian Kastner <ckk@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Christian Kastner <ckk@debian.org>:
Bug#1036114; Package src:libcap2. (Mon, 15 May 2023 17:48:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Christian Kastner <ckk@debian.org>. (Mon, 15 May 2023 17:48:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libcap2: CVE-2023-2602 CVE-2023-2603
Date: Mon, 15 May 2023 19:44:27 +0200
Source: libcap2
Version: 1:2.66-3
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerabilities were published for libcap2.

CVE-2023-2602[0]:
| LCAP-CR-23-01 (Correct the check of pthread_create()'s return value)

CVE-2023-2603[1]:
| LCAP-CR-23-02 (Large strings can confuse libcap's internal strdup
| code)

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-2602
    https://www.cve.org/CVERecord?id=CVE-2023-2602
[1] https://security-tracker.debian.org/tracker/CVE-2023-2603
    https://www.cve.org/CVERecord?id=CVE-2023-2603

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Reply sent to Christian Kastner <ckk@debian.org>:
You have taken responsibility. (Mon, 15 May 2023 21:06:03 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 15 May 2023 21:06:03 GMT) (full text, mbox, link).


Message #10 received at 1036114-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 1036114-close@bugs.debian.org
Subject: Bug#1036114: fixed in libcap2 1:2.66-4
Date: Mon, 15 May 2023 21:04:19 +0000
Source: libcap2
Source-Version: 1:2.66-4
Done: Christian Kastner <ckk@debian.org>

We believe that the bug you reported is fixed in the latest version of
libcap2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1036114@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Kastner <ckk@debian.org> (supplier of updated libcap2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 15 May 2023 20:34:57 +0200
Source: libcap2
Architecture: source
Version: 1:2.66-4
Distribution: unstable
Urgency: medium
Maintainer: Christian Kastner <ckk@debian.org>
Changed-By: Christian Kastner <ckk@debian.org>
Closes: 1036114
Changes:
 libcap2 (1:2.66-4) unstable; urgency=medium
 .
   * Apply upstream patches for CVE-2023-2602, CVE-2023-2603
     (Closes: #1036114)
Checksums-Sha1:
 61fd102a5500d02e5c780c549968faea496476d5 2204 libcap2_2.66-4.dsc
 70f32bb975da697995f6b2d5543feb770572c2eb 21468 libcap2_2.66-4.debian.tar.xz
 7d3e6c8067269ebc9b2224378cdf25551f46a5aa 5861 libcap2_2.66-4_source.buildinfo
Checksums-Sha256:
 ab4aaa349c824acaebfb63bec2d2bc10e7cee10ec6725ac6f21f1fe12aa9d8fb 2204 libcap2_2.66-4.dsc
 5379eec3a05e40c2485ebe451506883c1f2f99d552c6ded29607080fd278dd7c 21468 libcap2_2.66-4.debian.tar.xz
 a9d2c0ddce53e7e1b6f7b240569eb1d9337fe3bc1dd063396b7be6b68e2f71ae 5861 libcap2_2.66-4_source.buildinfo
Files:
 2a332f4dcf78e0c2ff6038c18f2c2294 2204 libs optional libcap2_2.66-4.dsc
 87d4b91e92b732e64902e7f69de4d001 21468 libs optional libcap2_2.66-4.debian.tar.xz
 61ec428a1848235d6b661af279a8fb08 5861 libs optional libcap2_2.66-4_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=XfhF
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Tue May 16 13:13:14 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.