Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
References
Link | Resource |
---|---|
https://projectacrn.github.io/2.1/asa.html#addressed-in-acrn-v2-1 | Third Party Advisory |
https://projectacrn.github.io/latest/ | Third Party Advisory |
https://projectacrn.github.io/latest/developer-guides/hld/split-dm.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-08-31 09:15
Updated : 2020-09-08 12:20
NVD link : CVE-2020-15687
Mitre link : CVE-2020-15687
JSON object : View
CWE
Products Affected
linuxfoundation
- acrn