A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
{
"binaries": [
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-block-extra"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-guest-agent"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-kvm"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-arm"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-common"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-data"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-gui"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-mips"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-misc"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-ppc"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-s390x"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-sparc"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-x86"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-x86-microvm"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-system-x86-xen"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-user"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-user-binfmt"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-user-static"
},
{
"binary_version": "1:4.2-3ubuntu5",
"binary_name": "qemu-utils"
}
],
"availability": "No subscription required"
}