Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3. In the latter case, this would affect the entire host.Īn issue was discovered in Prosody before 0.11.9. HVM guests with PCI pass through devices can mount a Denial of Service (DoS) attack affecting the pass through of PCI devices to other guests or the hardware domain. Such reboots will leak any vectors used by the MSI(-X) entries that the guest might had enabled, and hence will lead to vector exhaustion on the system, not allowing further PCI pass through devices to work properly. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and entries setup. For more information, see Īn issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see ĭOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. National Library of the Netherlands multiNER = >=2.4.0 contain Out-of-bounds Write (CWE-787).
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |