CVE Vulnerabilities

CVE-2020-10702

Published: Jun 04, 2020 | Modified: Nov 07, 2023
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.5 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

Affected Software

Name Vendor Start Version End Version
Qemu Qemu 4.0.0 (including) 5.0.0 (excluding)
Advanced Virtualization for RHEL 8.2.1 RedHat virt:8.2-8020120200707202843.11e3e113 *
Advanced Virtualization for RHEL 8.2.1 RedHat virt-devel:8.2-8020120200707202843.11e3e113 *
Qemu Ubuntu devel *
Qemu Ubuntu eoan *
Qemu Ubuntu focal *
Qemu Ubuntu trusty *

References