How Menlo Uses Isolation to Secure Mobile Devices in the Cloud

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database CVE-2021-22364
PUBLISHED: 2021-05-27

There is a denial of service vulnerability in the versions of HUAWEI Mate 30 and of HUAWEI Mate 30 (5G) . A module does not verify certain parameters sufficiently and it leads to some exceptions. Successful exploit could cause a denial of service condi…

PUBLISHED: 2021-05-27

There is an out-of-bounds write vulnerability in some Huawei products. The code of a module have a bad judgment logic. Attackers can exploit this vulnerability by performing multiple abnormal activities to trigger the bad logic and cause out-of-bounds write. This may compromise the normal service of…

PUBLISHED: 2021-05-27

runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.

PUBLISHED: 2021-05-27

please before 0.4 allows a local unprivileged attacker to gain knowledge about the existence of files or directories in privileged locations via the search_path function, the –check option, or the -d option.

PUBLISHED: 2021-05-27

pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.