First published: Mon Aug 31 2020(Updated: )
Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Acrn | =1.6.1 | |
Linuxfoundation Acrn | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.