On 10/22/20 2:19 AM, 54th Parallel wrote:
XSA-346, XSA-457: A malicious domain with a PCI device (e.g., sys-net or sys-usb in the default configuration) could try to exploit this vulnerability in order to crash the host.Just wanted to point out that there's a very minor typo here ('XSA-457').
Thank you for pointing out the typo. We'll make sure this gets fixed in the repo and website versions.
Also, since the last QSB was posted on Discourse, I was wondering if this should be too.
It's automatic, but there might be a delay. -- Andrew David Wong (Axon) Community Manager, Qubes OS https://www.qubes-os.org -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/de09e7da-dee6-edbf-8728-576e2bafc028%40qubes-os.org.
Description: OpenPGP digital signature