Ubuntu 5784-1: usbredir vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5784-1
January 03, 2023

usbredir vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

usbredir could be made to crash or run programs if it received
specially crafted input.

Software Description:
- usbredir: usbredir libraries and utilities

Details:

It was discovered that usbredir incorrectly handled memory when
serializing large amounts of data in the case of a slow or blocked
destination. An attacker could possibly use this issue to cause
applications using usbredir to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
   libusbredirhost1                0.8.0-1ubuntu0.1
   libusbredirparser1              0.8.0-1ubuntu0.1
   usbredirserver                  0.8.0-1ubuntu0.1

Ubuntu 18.04 LTS:
   libusbredirhost1                0.7.1-1ubuntu0.18.04.1
   libusbredirparser1              0.7.1-1ubuntu0.18.04.1
   usbredirserver                  0.7.1-1ubuntu0.18.04.1

Ubuntu 16.04 ESM:
   libusbredirhost1                0.7.1-1ubuntu0.16.04.1~esm1
   libusbredirparser1              0.7.1-1ubuntu0.16.04.1~esm1
   usbredirserver                  0.7.1-1ubuntu0.16.04.1~esm1

Ubuntu 14.04 ESM:
   libusbredirhost1                0.6-2ubuntu1.1+esm1
   libusbredirparser1              0.6-2ubuntu1.1+esm1
   usbredirserver                  0.6-2ubuntu1.1+esm1

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5784-1
   CVE-2021-3700

Package Information:
   https://launchpad.net/ubuntu/+source/usbredir/0.8.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/usbredir/0.7.1-1ubuntu0.18.04.1

Ubuntu 5784-1: usbredir vulnerability

January 3, 2023
usbredir could be made to crash or run programs if it received specially crafted input.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: usbredir could be made to crash or run programs if it received specially crafted input. Software Description: - usbredir: usbredir libraries and utilities Details: It was discovered that usbredir incorrectly handled memory when serializing large amounts of data in the case of a slow or blocked destination. An attacker could possibly use this issue to cause applications using usbredir to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS:   libusbredirhost1                0.8.0-1ubuntu0.1   libusbredirparser1              0.8.0-1ubuntu0.1   usbredirserver                  0.8.0-1ubuntu0.1 Ubuntu 18.04 LTS:   libusbredirhost1                0.7.1-1ubuntu0.18.04.1   libusbredirparser1              0.7.1-1ubuntu0.18.04.1   usbredirserver                  0.7.1-1ubuntu0.18.04.1 Ubuntu 16.04 ESM:   libusbredirhost1                0.7.1-1ubuntu0.16.04.1~esm1   libusbredirparser1              0.7.1-1ubuntu0.16.04.1~esm1   usbredirserver                  0.7.1-1ubuntu0.16.04.1~esm1 Ubuntu 14.04 ESM:   libusbredirhost1                0.6-2ubuntu1.1+esm1   libusbredirparser1              0.6-2ubuntu1.1+esm1   usbredirserver                  0.6-2ubuntu1.1+esm1 In general, a standard system update will make all the necessary changes.

References

  https://ubuntu.com/security/notices/USN-5784-1

  CVE-2021-3700

Severity
Ubuntu Security Notice USN-5784-1

Package Information

  https://launchpad.net/ubuntu/+source/usbredir/0.8.0-1ubuntu0.1 https://launchpad.net/ubuntu/+source/usbredir/0.7.1-1ubuntu0.18.04.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.