ASA-201902-7 generated external raw

[ASA-201902-7] libu2f-host: arbitrary code execution
Arch Linux Security Advisory ASA-201902-7 ========================================= Severity: High Date : 2019-02-11 CVE-ID : CVE-2018-20340 Package : libu2f-host Type : arbitrary code execution Remote : No Link : Summary ======= The package libu2f-host before version 1.1.7-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 1.1.7-1. # pacman -Syu "libu2f-host>=1.1.7-1" The problem has been fixed upstream in version 1.1.7. Workaround ========== None. Description =========== Yubico library libu2f-host prior to version 1.1.7 contains an unchecked buffer, which could allow a buffer overflow. Libu2f-host is a library that implements the host party of the U2F protocol. This issue can allow an attacker with a custom made malicious USB device masquerading as a security key, and physical access to a computer where PAM U2F or an application with libu2f-host integrated, to potentially execute arbitrary code on that computer. Users of the YubiKey PAM U2F Tool are the most impacted since the arbitrary code could execute with elevated privileges. Impact ====== A malicious USB device can execute arbitrary code on the host. References ==========