Vigil@nce - Vigil@nce - QEMU: overload via xhci_ring_chain_length(), analyzed on 18/08/2022
September 2022 by Vigil@nce
Vigil@nce - An attacker can trigger an overload of QEMU, via xhci_ring_chain_length(), in order to trigger a denial of service.
Plus d'information sur : https://vigilance.fr/vulnerability/QEMU-overload-via-xhci-ring-chain-length-39072