Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-10702

Опубликовано: 04 июн. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1
CVSS3: 5.5

Описание

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

1:4.2-3ubuntu5
eoan

released

1:4.0+dfsg-0ubuntu9.6
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

1:4.2-3ubuntu5
esm-infra/xenial

not-affected

code not present
focal

released

1:4.2-3ubuntu5
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

precise/esm

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

not-affected

debian: Vulnerable code introduced later

Показывать по

EPSS

Процентиль: 9%
0.00036
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
nvd
около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5.5
debian
около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authenti ...

CVSS3: 5.5
github
около 3 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

EPSS

Процентиль: 9%
0.00036
Низкий

2.1 Low

CVSS2

5.5 Medium

CVSS3

Уязвимость CVE-2020-10702