{"id":"USN-6166-1","summary":"libcap2 vulnerabilities","details":"David Gstir discovered that libcap2 incorrectly handled certain return\ncodes. An attacker could possibly use this issue to cause libcap2 to\nconsume memory, leading to a denial of service. (CVE-2023-2602)\n\nRichard Weinberger discovered that libcap2 incorrectly handled certain long\ninput strings. An attacker could use this issue to cause libcap2 to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2023-2603)\n","modified":"2026-04-24T09:47:37.407737545Z","published":"2023-06-14T13:40:25Z","related":["UBUNTU-CVE-2023-2602","UBUNTU-CVE-2023-2603"],"upstream":["CVE-2023-2603","UBUNTU-CVE-2023-2603"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6166-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2603"}],"affected":[{"package":{"name":"libcap2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libcap2@1:2.32-1ubuntu0.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.32-1ubuntu0.1"}]}],"versions":["1:2.25-2","1:2.27-1","1:2.32-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.32-1ubuntu0.1","binary_name":"libcap2"},{"binary_version":"1:2.32-1ubuntu0.1","binary_name":"libcap2-bin"},{"binary_version":"1:2.32-1ubuntu0.1","binary_name":"libpam-cap"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-2603","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6166-1.json"}},{"package":{"name":"libcap2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libcap2@1:2.44-1ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.44-1ubuntu0.22.04.1"}]}],"versions":["1:2.44-1build1","1:2.44-1build2","1:2.44-1build3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:2.44-1ubuntu0.22.04.1","binary_name":"libcap2"},{"binary_version":"1:2.44-1ubuntu0.22.04.1","binary_name":"libcap2-bin"},{"binary_version":"1:2.44-1ubuntu0.22.04.1","binary_name":"libpam-cap"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-2603","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6166-1.json"}}],"schema_version":"1.7.5"}