vulnerability

SUSE: CVE-2020-14394: SUSE Linux Security Advisory

Severity
1
CVSS
(AV:L/AC:L/Au:M/C:N/I:N/A:P)
Published
Aug 17, 2022
Added
Aug 9, 2024
Modified
Jan 28, 2025

Description

An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.

Solutions

suse-upgrade-qemususe-upgrade-qemu-accel-qtestsuse-upgrade-qemu-accel-tcg-x86suse-upgrade-qemu-armsuse-upgrade-qemu-audio-alsasuse-upgrade-qemu-audio-jacksuse-upgrade-qemu-audio-osssuse-upgrade-qemu-audio-pasuse-upgrade-qemu-audio-sdlsuse-upgrade-qemu-audio-spicesuse-upgrade-qemu-block-curlsuse-upgrade-qemu-block-dmgsuse-upgrade-qemu-block-glustersuse-upgrade-qemu-block-iscsisuse-upgrade-qemu-block-nfssuse-upgrade-qemu-block-rbdsuse-upgrade-qemu-block-sshsuse-upgrade-qemu-chardev-baumsuse-upgrade-qemu-chardev-spicesuse-upgrade-qemu-extrasuse-upgrade-qemu-guest-agentsuse-upgrade-qemu-hw-display-qxlsuse-upgrade-qemu-hw-display-virtio-gpususe-upgrade-qemu-hw-display-virtio-gpu-pcisuse-upgrade-qemu-hw-display-virtio-vgasuse-upgrade-qemu-hw-s390x-virtio-gpu-ccwsuse-upgrade-qemu-hw-usb-hostsuse-upgrade-qemu-hw-usb-redirectsuse-upgrade-qemu-hw-usb-smartcardsuse-upgrade-qemu-ipxesuse-upgrade-qemu-ivshmem-toolssuse-upgrade-qemu-ksmsuse-upgrade-qemu-kvmsuse-upgrade-qemu-langsuse-upgrade-qemu-linux-usersuse-upgrade-qemu-microvmsuse-upgrade-qemu-ppcsuse-upgrade-qemu-s390suse-upgrade-qemu-s390xsuse-upgrade-qemu-seabiossuse-upgrade-qemu-sgabiossuse-upgrade-qemu-skibootsuse-upgrade-qemu-slofsuse-upgrade-qemu-testsuitesuse-upgrade-qemu-toolssuse-upgrade-qemu-ui-cursessuse-upgrade-qemu-ui-gtksuse-upgrade-qemu-ui-openglsuse-upgrade-qemu-ui-sdlsuse-upgrade-qemu-ui-spice-appsuse-upgrade-qemu-ui-spice-coresuse-upgrade-qemu-vgabiossuse-upgrade-qemu-vhost-user-gpususe-upgrade-qemu-x86
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.