An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:39:09.821Z
Reserved: 2019-12-31T00:00:00
Link: CVE-2019-20175
Updated: 2024-08-05T02:39:09.821Z
Status : Modified
Published: 2019-12-31T04:15:10.503
Modified: 2024-11-21T04:38:09.763
Link: CVE-2019-20175
No data.
OpenCVE Enrichment
No data.
Weaknesses