mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-09-17 06:49:25 +00:00
doc: fix all headings to use title case
While we hoped to make the headings consistent over time while doing other edits, we should instead just make the squirrels happy and do them all at once or they'll likely never be made consistent. A python script was used to find the headings, and then a call to https://pypi.org/project/titlecase to transform the title. A visual inspection was used to tweak a few unexpected resulting titles. Signed-off-by: David B. Kinder <david.b.kinder@intel.com>
This commit is contained in:
committed by
David Kinder
parent
6e655d098b
commit
0bd384d41b
20
doc/asa.rst
20
doc/asa.rst
@@ -3,13 +3,13 @@
|
||||
Security Advisory
|
||||
#################
|
||||
|
||||
Addressed in ACRN v2.3
|
||||
Addressed in ACRN V2.3
|
||||
************************
|
||||
|
||||
We recommend that all developers upgrade to this v2.3 release (or later), which
|
||||
addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
------
|
||||
-----
|
||||
|
||||
- NULL Pointer Dereference in ``devicemodel\hw\pci\virtio\virtio_mei.c``
|
||||
``vmei_proc_tx()`` function tries to find the ``iov_base`` by calling
|
||||
@@ -19,13 +19,13 @@ addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
**Affected Release:** v2.2 and earlier.
|
||||
|
||||
Addressed in ACRN v2.1
|
||||
Addressed in ACRN V2.1
|
||||
************************
|
||||
|
||||
We recommend that all developers upgrade to this v2.1 release (or later), which
|
||||
addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
------
|
||||
-----
|
||||
|
||||
- Missing access control restrictions in the Hypervisor component
|
||||
A malicious entity with root access in the Service VM
|
||||
@@ -36,13 +36,13 @@ addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
**Affected Release:** v2.0 and v1.6.1.
|
||||
|
||||
Addressed in ACRN v1.6.1
|
||||
Addressed in ACRN V1.6.1
|
||||
************************
|
||||
|
||||
We recommend that all developers upgrade to this v1.6.1 release (or later), which
|
||||
addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
------
|
||||
-----
|
||||
|
||||
- Service VM kernel Crashes When Fuzzing HC_ASSIGN_PCIDEV and HC_DEASSIGN_PCIDEV
|
||||
NULL pointer dereference due to invalid address of PCI device to be assigned or
|
||||
@@ -52,13 +52,13 @@ addresses the following security issue that was discovered in previous releases:
|
||||
**Affected Release:** v1.6.
|
||||
|
||||
|
||||
Addressed in ACRN v1.6
|
||||
Addressed in ACRN V1.6
|
||||
**********************
|
||||
|
||||
We recommend that all developers upgrade to this v1.6 release (or later), which
|
||||
addresses the following security issues that were discovered in previous releases:
|
||||
|
||||
------
|
||||
-----
|
||||
|
||||
- Hypervisor Crashes When Fuzzing HC_DESTROY_VM
|
||||
The input 'vdev->pdev' should be validated properly when handling
|
||||
@@ -84,13 +84,13 @@ addresses the following security issues that were discovered in previous release
|
||||
**Affected Release:** v1.4 and earlier.
|
||||
|
||||
|
||||
Addressed in ACRN v1.4
|
||||
Addressed in ACRN V1.4
|
||||
**********************
|
||||
|
||||
We recommend that all developers upgrade to this v1.4 release (or later), which
|
||||
addresses the following security issues that were discovered in previous releases:
|
||||
|
||||
------
|
||||
-----
|
||||
|
||||
- Mitigation for Machine Check Error on Page Size Change
|
||||
Improper invalidation for page table updates by a virtual guest operating
|
||||
|
Reference in New Issue
Block a user