First published: Mon Sep 28 2020(Updated: )
A null pointer dereference issue was found in the LSI53C895A SCSI Host Bus Adapter emulator of QEMU. It could occur while performing processing 'Memory Move' instructions to move data beteween dma memory and i/o address space via lsi_memcpy(). A guest user/process may use this flaw to crash the QEMU process resulting in DoS scenario. Upstream patch(proposed): -------------------------- -> <a href="https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html">https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/QEMU | <5.1.1 | 5.1.1 |
QEMU KVM | <5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25742 is classified as a high severity vulnerability due to the potential for a guest user to crash the QEMU emulator.
To resolve CVE-2020-25742, you should upgrade to QEMU version 5.1.1 or later.
CVE-2020-25742 affects QEMU by allowing a guest user to exploit a null pointer dereference to crash the QEMU emulator.
CVE-2020-25742 affects all versions of QEMU prior to 5.1.1.
No, CVE-2020-25742 is not a remote code execution vulnerability; it specifically leads to a crash of the QEMU emulator.