CVE-2019-20175
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/12/2019
Last modified:
05/08/2024
Description
An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.4.0 (including) | 4.2.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html
- https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html
- https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html
- https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html
- https://www.mail-archive.com/qemu-devel%40nongnu.org/msg667396.html



