First published: Wed Aug 11 2021(Updated: )
A use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c. This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/usbredir | <0.11.0 | 0.11.0 |
Spice-space Usbredir | <0.11.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3700 is a use-after-free vulnerability found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c.
This vulnerability occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.
Versions prior to 0.11.0 of usbredir, Spice-space Usbredir, Redhat Enterprise Linux 6.0, Redhat Enterprise Linux 7.0, Redhat Enterprise Linux 8.0, Fedoraproject Fedora 34, and Debian Debian Linux 9.0 are affected by CVE-2021-3700.
The severity of CVE-2021-3700 is medium, with a CVSS score of 6.4.
To fix CVE-2021-3700, update usbredir to version 0.11.0 or later.