vulnerability
Arch Linux: Denial of service (CVE-2020-25723)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Dec 2, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 2, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A reachable assertion issue was found in the USB EHCI emulation code of QEMU before version 5.2.0. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-25723
- https://attackerkb.com/topics/CVE-2020-25723
- URL-http://www.openwall.com/lists/oss-security/2020/12/22/1
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- URL-https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
- URL-https://security.archlinux.org/ASA-202012-26
- URL-https://security.netapp.com/advisory/ntap-20201218-0004/
- CWE-617
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.