Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-7674 Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:22:30.722Z

Reserved: 2020-07-13T00:00:00

Link: CVE-2020-15687

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-31T16:15:14.897

Modified: 2024-11-21T05:06:00.930

Link: CVE-2020-15687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.