mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-06-04 13:19:47 +00:00
The vulnerability was scanned by Trivy on May 28,2024. Vulnerability ID is GHSA-xphf-cx8h-7q9g and severity is medium, with title iFrames Bypass Origin Checks for Tauri API Access Control. I fixed the crash and checked by build-install-launch procedure, I confirm it was solved. Signed-off-by: dongpingx <dongpingx.wu@intel.com> Tracked-On: #8613 |
||
---|---|---|
.. | ||
config_tools | ||
debug_tools | ||
efi-stub | ||
hv_prebuild | ||
packaging | ||
sample_application | ||
services | ||
Makefile | ||
README.rst |
ACRN Tools ########## The open source `Project ACRN`_ defines a device hypervisor reference stack and an architecture for running multiple software subsystems, managed securely, on a consolidated system by means of a virtual machine manager. It also defines a reference framework implementation for virtual device emulation, called the "ACRN Device Model". This folder holds the source to a number of tools that facilitate the management, debugging, profiling, and logging of multi-OS systems based on ACRN. You can find out more about Project ACRN and its set of tools on the `Project ACRN documentation`_ website. .. _`Project ACRN`: https://projectacrn.org .. _`Project ACRN documentation`: https://projectacrn.github.io/