On 10/22/20 2:19 AM, 54th Parallel wrote:

XSA-346, XSA-457: A malicious domain with a PCI device (e.g., sys-net or
sys-usb in the default configuration) could try to exploit this
vulnerability in order to crash the host.

Just wanted to point out that there's a very minor typo here ('XSA-457').

Thank you for pointing out the typo. We'll make sure this gets fixed in the repo and website versions.

Also, since the last QSB was posted on Discourse, I was wondering if this
should be too.

It's automatic, but there might be a delay.

Andrew David Wong (Axon)
Community Manager, Qubes OS

You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to