2 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 1

A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB. • https://bugzilla.redhat.com/show_bug.cgi?id=2209113 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf https://access.redhat.com/security/cve/CVE-2023-2603 • CWE-190: Integer Overflow or Wraparound •

CVSS: 4.6EPSS: 0%CPEs: 22EXPL: 0

The capsh program in libcap before 2.22 does not change the current working directory when the --chroot option is specified, which allows local users to bypass the chroot restrictions via unspecified vectors. El programa capsh en libcap anterior a 2.22 no cambia el directorio de trabajo actual cuando la opción --chroot es especificada, lo que permite a usuarios locales evadir las restricciones chroot a través de vectores no especificados. • http://rhn.redhat.com/errata/RHSA-2011-1694.html https://bugzilla.redhat.com/show_bug.cgi?id=722694 https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222 https://access.redhat.com/security/cve/CVE-2011-4099 • CWE-264: Permissions, Privileges, and Access Controls •