mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-04-27 19:30:48 +00:00
Trivy scaned one vulnerability three days ago and we fixed it now. The title for vulnerability is openssl's `MemBio:get_buf` has undefined behavior with empty buffers. I tested through building configurator, launching it and generating scenario.xml & launch scripts. I confirmed the result is correct. Signed-off-by: dongpingx <dongpingx.wu@intel.com> Tracked-On: #8668 |
||
---|---|---|
.. | ||
config_tools | ||
debug_tools | ||
efi-stub | ||
hv_prebuild | ||
packaging | ||
sample_application | ||
services | ||
Makefile | ||
README.rst |
ACRN Tools ########## The open source `Project ACRN`_ defines a device hypervisor reference stack and an architecture for running multiple software subsystems, managed securely, on a consolidated system by means of a virtual machine manager. It also defines a reference framework implementation for virtual device emulation, called the "ACRN Device Model". This folder holds the source to a number of tools that facilitate the management, debugging, profiling, and logging of multi-OS systems based on ACRN. You can find out more about Project ACRN and its set of tools on the `Project ACRN documentation`_ website. .. _`Project ACRN`: https://projectacrn.org .. _`Project ACRN documentation`: https://projectacrn.github.io/