Home
last modified time | relevance | path

Searched refs:malicious (Results 1 – 25 of 46) sorted by relevance

12

/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/qemu/qemu/
H A Dpvrdma.patch1 hw/pvrdma: Protect against buggy or malicious guest driver
5 This might happen on purpose (malicious guest) or because some other
24 + /* Buggy or malicious guest driver */
42 + /* Buggy or malicious guest driver */
/OK3568_Linux_fs/buildroot/boot/grub2/
H A D0048-usb-Avoid-possible-out-of-bound-accesses-caused-by-m.patch4 Subject: [PATCH] usb: Avoid possible out-of-bound accesses caused by malicious
8 no out-of-bound checking to prevent a malicious USB device to report large
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-defusedxml_0.7.1.bb3 parsers that prevent any potentially malicious operation."
/OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/
H A Dl1tf.rst55 opportunity for side channel attacks to unprivileged malicious code,
72 PTE which is marked non present. This allows a malicious user space
84 malicious user space applications.
89 The fact that L1TF breaks all domain protections allows malicious guest
90 OSes, which can control the PTEs directly, and malicious guest user
98 only to attack data which is present in L1D, a malicious guest running
161 The kernel is unconditionally protected against L1TF attacks from malicious
177 by a potentially malicious guest, it also flushes the guest
518 further, but still allows a malicious guest to explore a limited amount
582 - PTE inversion to protect against malicious user space. This is done
H A Dtsx_async_abort.rst61 The victim of a malicious actor does not need to make use of TSX. Only the
77 a result, the malicious actor has to sample as much data as possible and
262 might allow a malicious actor to leak data from the host or from other
H A Dmds.rst53 incorrect program execution or state changes. But a malicious operation
67 Attacks against the MDS vulnerabilities can be mounted from malicious non
221 for malicious user space. The exposure can be disabled on the kernel
H A Dmultihit.rst8 or cache type. A malicious guest running on a virtualized system can
62 Attacks against the iTLB multihit erratum can be mounted from malicious
H A Dspectre.rst128 (BTB) may be shared between hardware threads in a CPU core. A malicious
233 A malicious user process can try to attack another user process,
507 target buffer left by malicious software. Alternatively, the
/OK3568_Linux_fs/buildroot/package/clamav/
H A DConfig.in15 trojans, viruses, malware & other malicious threats.
/OK3568_Linux_fs/buildroot/package/fail2ban/
H A DConfig.in7 bans IPs that show the malicious signs -- too many password
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-gnome/vte9/vte9/
H A Dcve-2012-2738.patch10 To guard against malicious sequences containing excessively big numbers,
56 Don't allow malicious sequences to cause excessive repetitions.
/OK3568_Linux_fs/kernel/Documentation/driver-api/mmc/
H A Dmmc-dev-parts.rst40 not accessible through sysfs in order to avoid accidental or malicious
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/
H A Dvlock_2.2.3.bb2 DESCRIPTION = "Sometimes a malicious local user could cause more problems \
/OK3568_Linux_fs/kernel/fs/verity/
H A DKconfig32 protection against malicious disks vs. an ahead-of-time hash.
/OK3568_Linux_fs/kernel/Documentation/security/keys/
H A Decryptfs.rst37 threats of malicious software, because it is available in clear form only at
/OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/
H A DMirOS16 * implied; without malicious intent or gross negligence. In no event
/OK3568_Linux_fs/kernel/Documentation/x86/
H A Dmds.rst109 data cannot be controlled in a way which allows exploitation from malicious
184 flushed either on exit to user space or on VMENTER so malicious code
/OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/pci/
H A Dpci.txt72 malicious devices to this port.
/OK3568_Linux_fs/kernel/drivers/firmware/efi/
H A DKconfig229 kernel. System firmware may configure the IOMMU to prevent malicious
238 any malicious PCI devices from being able to perform DMA until the
/OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/
H A Ddm-integrity.rst156 Protect sector numbers in the journal from accidental or malicious
158 crc algorithm, to protect against malicious modification, use a
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssl/openssl/
H A DCVE-2023-0464.patch9 vulnerability by creating a malicious certificate chain that triggers
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-shells/zsh/zsh/
H A DCVE-2021-45444_2.patch100 +# due to malicious input as a consequence of CVE-2021-45444, which affects
/OK3568_Linux_fs/kernel/drivers/net/ethernet/broadcom/bnx2x/
H A Dbnx2x_sriov.h145 bool malicious; /* true if FW indicated so, until FLR */ member
/OK3568_Linux_fs/kernel/Documentation/userspace-api/
H A Diommu.rst79 4. A malicious/misbehaving user passing illegal/invalid size but within
/OK3568_Linux_fs/kernel/Documentation/networking/device_drivers/ethernet/intel/
H A Digb.rst164 When a malicious driver attempts to send a spoofed packet, it is dropped by the

12