mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-08-05 02:11:23 +00:00
doc: update security advisory for v2.1 release
Add fixed security vulnerabilities for v2.1 release. Signed-off-by: Yonghua Huang <yonghua.huang@intel.com> Signed-off-by: David B. Kinder <david.b.kinder@intel.com>
This commit is contained in:
parent
98aaf23f5c
commit
c56fb35515
17
doc/asa.rst
17
doc/asa.rst
@ -3,6 +3,23 @@
|
|||||||
Security Advisory
|
Security Advisory
|
||||||
#################
|
#################
|
||||||
|
|
||||||
|
Addressed in ACRN v2.1
|
||||||
|
************************
|
||||||
|
|
||||||
|
We recommend that all developers upgrade to this v2.1 release (or later), which
|
||||||
|
addresses the following security issue that was discovered in previous releases:
|
||||||
|
|
||||||
|
------
|
||||||
|
|
||||||
|
- Missing access control restrictions in the Hypervisor component
|
||||||
|
A malicious entity with root access in the Service VM
|
||||||
|
userspace could abuse the PCIe assign/de-assign Hypercalls via crafted
|
||||||
|
ioctls and payloads. This attack can result in a corrupt state and Denial
|
||||||
|
of Service (DoS) for previously assigned PCIe devices to the Service VM
|
||||||
|
at runtime.
|
||||||
|
|
||||||
|
**Affected Release:** v2.0 and v1.6.1.
|
||||||
|
|
||||||
Addressed in ACRN v1.6.1
|
Addressed in ACRN v1.6.1
|
||||||
************************
|
************************
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user