First published: Fri Sep 25 2020(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 | |
QEMU KVM | =5.0.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25084 is classified as a moderate severity vulnerability due to its use-after-free condition in the QEMU USB handling code.
To mitigate CVE-2020-25084, update QEMU to a patched version such as 1:5.2+dfsg-11+deb11u3 or later.
CVE-2020-25084 affects QEMU version 5.0.0 specifically.
Yes, CVE-2020-25084's use-after-free condition can potentially lead to system instability or crashes.
CVE-2020-25084 primarily affects Debian-based systems using the vulnerable QEMU versions.