CVE-2020-25084
Published: 25 September 2020
QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
bionic |
Released
(1:2.11+dfsg-1ubuntu7.34)
|
focal |
Released
(1:4.2-3ubuntu6.10)
|
|
groovy |
Released
(1:5.0-5ubuntu9.2)
|
|
hirsute |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
impish |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
jammy |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
kinetic |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
lunar |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
mantic |
Released
(1:5.2+dfsg-2ubuntu1)
|
|
trusty |
Needed
|
|
upstream |
Released
(1:5.2+dfsg-1)
|
|
xenial |
Released
(1:2.5+dfsg-5ubuntu10.48)
|
|
Patches: upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=21bc31524e8ca487e976f713b878d7338ee00df2 |
||
qemu-kvm Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
lunar |
Does not exist
|
|
mantic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.2 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
References
- https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08050.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08043.html
- https://www.openwall.com/lists/oss-security/2020/09/16/5
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fxhci_uaf_2
- http://www.openwall.com/lists/oss-security/2020/09/16/5
- https://ubuntu.com/security/notices/USN-4650-1
- https://www.cve.org/CVERecord?id=CVE-2020-25084
- NVD
- Launchpad
- Debian