Acrn Linux Acrn

stack.watch can email you when security vulnerabilities are reported in Linux Acrn. You can add multiple products that you use with Acrn to create your own personal software stack watcher.

By the Year

In 2021 there have been 0 vulnerabilities in Linux Acrn . Acrn did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2021 0 0.00
2020 0 0.00
2019 1 7.50
2018 0 0.00

It may take a day or so for new Acrn vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Linux Acrn Security Vulnerabilities

The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might

CVE-2019-18844 7.5 - High - November 13, 2019

The Device Model in ACRN before 2019w25.5-140000p relies on assert calls in devicemodel/hw/pci/core.c and devicemodel/include/pci_core.h (instead of other mechanisms for propagating error information or diagnostic information), which might allow attackers to cause a denial of service (assertion failure) within pci core. This is fixed in 1.2. 6199e653418e is a mitigation for pre-1.1 versions, whereas 2b3dedfb9ba1 is a mitigation for 1.1.

CVE-2019-18844 is exploitable with network access, and does not require authorization privledges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Reachable Assertion