Skip to content

** DISPUTED ** An issue was discovered in ide_dma_cb() in...

Moderate severity Unreviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Mar 30, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

** DISPUTED ** An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert."

References

Published by the National Vulnerability Database Dec 31, 2019
Published to the GitHub Advisory Database May 24, 2022
Last updated Mar 30, 2024

Severity

Moderate

EPSS score

0.283%
(68th percentile)

Weaknesses

CVE ID

CVE-2019-20175

GHSA ID

GHSA-4r96-hw22-hhc7

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.