On 10/22/20 2:19 AM, 54th Parallel wrote:


XSA-346, XSA-457: A malicious domain with a PCI device (e.g., sys-net or
sys-usb in the default configuration) could try to exploit this
vulnerability in order to crash the host.


Just wanted to point out that there's a very minor typo here ('XSA-457').

Thank you for pointing out the typo. We'll make sure this gets fixed in the repo and website versions.

Also, since the last QSB was posted on Discourse, I was wondering if this
should be too.

It's automatic, but there might be a delay.

--
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/de09e7da-dee6-edbf-8728-576e2bafc028%40qubes-os.org.

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to