An OOB access issue was found in the Message Signalled Interrupt (MSI-X) device support of QEMU. It could occur while performing MSI-X mmio operations when a guest sent address goes beyond the mmio region. A guest user/process may use this flaw to crash the QEMU process resulting in DoS scenario.
Source link
[Bug 1842363] CVE-2020-13754 QEMU: msix: OOB access during mmio operations may lead to DoS
RELATED STORIES
Wegen einer vor wenigen Tagen bekanntgewordenen Sicherheitslücke sind laut US-Medienberichten Zehntausende E-Mail-Server von Unternehmen, Behörden...
Microsoft has released a PowerShell script that admins can use to check whether the recently...
Description. A remote unauthenticated cross-site request forgery (csrf) vulnerability was discovered in Aruba AirWave Management...
Original release date: March 4, 2021 Cisco has released security updates to address a vulnerability...
Ubuntu Security Notice 4754-4 – USN-4754-1 fixed vulnerabilities in Python. Because of a regression, a...
Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over...
Critical vulnerability found in Snow Software’s Inventory Agent A vulnerability in Snow Software’s Snow Inventory Agent...
Hello everyone, I have returned to tackle part four of my series on Windows exploitation,...
Yeastar NeoGate TG400 中存在路径遍历漏洞。该漏洞源于产品未能正确地过滤资源或文件路径中的特殊元素,经过身份验证的用户可以解密固件,并可以读取敏感信息,如密码或解密密钥。以下产品及版本受到影响:Yeastar NeoGate TG400 91.3.0.3。 Copyright © 北京奇虎科技有限公司 360网络攻防实验室 安全客 All Rights Reserved...
Description: Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion...
You must be logged in to post a comment.