mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-08-03 17:31:42 +00:00
doc: update security advisory for v2.1 release
Add fixed security vulnerabilities for v2.1 release. Signed-off-by: Yonghua Huang <yonghua.huang@intel.com> Signed-off-by: David B. Kinder <david.b.kinder@intel.com>
This commit is contained in:
parent
98aaf23f5c
commit
c56fb35515
17
doc/asa.rst
17
doc/asa.rst
@ -3,6 +3,23 @@
|
||||
Security Advisory
|
||||
#################
|
||||
|
||||
Addressed in ACRN v2.1
|
||||
************************
|
||||
|
||||
We recommend that all developers upgrade to this v2.1 release (or later), which
|
||||
addresses the following security issue that was discovered in previous releases:
|
||||
|
||||
------
|
||||
|
||||
- Missing access control restrictions in the Hypervisor component
|
||||
A malicious entity with root access in the Service VM
|
||||
userspace could abuse the PCIe assign/de-assign Hypercalls via crafted
|
||||
ioctls and payloads. This attack can result in a corrupt state and Denial
|
||||
of Service (DoS) for previously assigned PCIe devices to the Service VM
|
||||
at runtime.
|
||||
|
||||
**Affected Release:** v2.0 and v1.6.1.
|
||||
|
||||
Addressed in ACRN v1.6.1
|
||||
************************
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user