CVE-2020-25084Use After Free in Qemu

CWE-416Use After Free10 documents7 sources
Severity
3.2LOWNVD
OSV6.3
EPSS
0.0%
top 89.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 25
Latest updateMay 24

Description

QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:LExploitability: 1.5 | Impact: 1.4

Affected Packages4 packages

debiandebian/qemu< qemu 1:5.2+dfsg-1 (bookworm)
Debianqemu/qemu< 1:5.2+dfsg-1+3
Ubuntuqemu/qemu< 1:2.5+dfsg-5ubuntu10.48+2
NVDqemu/qemu5.0.0

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-xx58-g4hc-mr9f: QEMU 52022-05-24
OSV
qemu vulnerabilities2020-11-30
OSV
CVE-2020-25084: QEMU 52020-09-25

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2020-11-30
Red Hat
QEMU: usb: use-after-free issue while setting up packet2020-06-24
Debian
CVE-2020-25084: qemu - QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map ...2020

💬Community

3
Bugzilla
CVE-2020-25084 xen: QEMU: usb: use-after-free issue while setting up packet [fedora-all]2020-09-16
Bugzilla
CVE-2020-25084 QEMU: usb: use-after-free issue while setting up packet2020-09-16
Bugzilla
CVE-2020-25084 qemu: usb: use-after-free issue while setting up packet [fedora-all]2020-09-16