Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2019-20175



** DISPUTED ** An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a privileged guest user has many ways to cause similar DoS effect, without triggering this assert.

Priority: MEDIUM
CVSS v3: 7.5
Component: qemu
Publish Date: Dec 31, 2019
Related ID: --
Modified Date: Jan 15, 2020

Find out more about CVE-2019-20175 from the MITRE-CVE dictionary and NIST NVD

Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Wind River Linux LTS 17 Fixed LIN10-6905 --
Wind River Linux 8 Fixed LIN8-11968 --
Wind River Linux 9 Fixed LIN9-9513 --
Wind River Linux 7 Requires LTSS -- -- --
Wind River Linux LTS 21 Not Vulnerable -- -- --
Wind River Linux LTS 22 Not Vulnerable -- -- --
Wind River Linux LTS 18 Fixed LIN1018-5562 --
Wind River Linux LTS 19 Fixed LIN1019-3886 --
Wind River Linux CD release Not Vulnerable -- -- --
VxWorks 7 Not Vulnerable -- -- --
VxWorks 6.9 Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see and for more information.
Live chat