Bug 1898579 (CVE-2020-25723) - CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
Summary: CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/h...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-25723
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1898624 1898625 1898628 1898629 1898630 1901875 1901876 1910662 1918008 1920266
Blocks: 1892324
TreeView+ depends on / blocked
 
Reported: 2020-11-17 14:49 UTC by Mauro Matteo Cascella
Modified: 2021-05-18 14:51 UTC (History)
34 users (show)

Fixed In Version: qemu 5.2.0
Clone Of:
Environment:
Last Closed: 2021-02-23 19:01:54 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0648 0 None None None 2021-02-23 18:44:16 UTC
Red Hat Product Errata RHSA-2021:0771 0 None None None 2021-03-09 11:12:33 UTC

Description Mauro Matteo Cascella 2020-11-17 14:49:07 UTC
A security issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests via ehci_execute() in hw/usb/hcd-ehci.c. More specifically, DMA memory map failure was not properly detected leading to reachable assertion (CWE-617) in a later call of address_space_unmap() via usb_packet_unmap(). This was fixed in the following commit by checking the return value of usb_packet_map(). A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.

Upstream fix:
https://git.qemu.org/?p=qemu.git;a=commit;h=2fdb42d840400d58f2e706ecca82c142b97bcbd6

Comment 1 Mauro Matteo Cascella 2020-11-17 14:49:16 UTC
Acknowledgments:

Name: Cheolwoo Myung

Comment 3 Mauro Matteo Cascella 2020-11-17 16:55:35 UTC
Created qemu tracking bugs for this issue:

Affects: epel-7 [bug 1898625]
Affects: fedora-all [bug 1898624]

Comment 8 RaTasha Tillery-Smith 2021-02-22 17:10:59 UTC
Statement:

Releases of Red Hat OpenStack Platform versions 15 and newer consume fixes directly from the Red Hat Enterprise Linux 8 Advanced Virtualization repository.

Comment 9 errata-xmlrpc 2021-02-23 18:44:14 UTC
This issue has been addressed in the following products:

  Advanced Virtualization for RHEL 8.2.1

Via RHSA-2021:0648 https://access.redhat.com/errata/RHSA-2021:0648

Comment 10 Product Security DevOps Team 2021-02-23 19:01:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-25723

Comment 11 errata-xmlrpc 2021-03-09 11:12:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2021:0771 https://access.redhat.com/errata/RHSA-2021:0771

Comment 12 errata-xmlrpc 2021-05-18 14:51:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:1762 https://access.redhat.com/errata/RHSA-2021:1762


Note You need to log in before you can comment on or make changes to this bug.