CVE-2020-15687

Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linuxfoundation:acrn:1.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linuxfoundation:acrn:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://projectacrn.github.io/2.1/asa.html#addressed-in-acrn-v2-1 - Third Party Advisory () https://projectacrn.github.io/2.1/asa.html#addressed-in-acrn-v2-1 - Third Party Advisory
References () https://projectacrn.github.io/latest/ - Third Party Advisory () https://projectacrn.github.io/latest/ - Third Party Advisory
References () https://projectacrn.github.io/latest/developer-guides/hld/split-dm.html - Third Party Advisory () https://projectacrn.github.io/latest/developer-guides/hld/split-dm.html - Third Party Advisory

Information

Published : 2020-08-31 16:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15687

Mitre link : CVE-2020-15687

CVE.ORG link : CVE-2020-15687


JSON object : View

Products Affected

linuxfoundation

  • acrn