First published: Thu Jun 04 2020(Updated: )
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-2 1:9.2.0+ds-5 | |
QEMU KVM | >=4.0.0<5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10702 is a vulnerability in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM.
The severity of CVE-2020-10702 is medium, with a severity value of 5.5.
QEMU versions between 4.0.0 and 5.0.0 are affected by CVE-2020-10702.
To fix CVE-2020-10702, update QEMU to version 5.0.0 or higher.
You can find more information about CVE-2020-10702 at the following references: [MITRE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10702), [Ubuntu Security Notices](https://ubuntu.com/security/notices/USN-4372-1), and [NIST NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-10702).