Description
An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:39:09.821Z
Reserved: 2019-12-31T00:00:00.000Z
Link: CVE-2019-20175
Updated: 2024-08-05T02:39:09.821Z
Status : Modified
Published: 2019-12-31T04:15:10.503
Modified: 2024-11-21T04:38:09.763
Link: CVE-2019-20175
No data.
OpenCVE Enrichment
No data.
Weaknesses