The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1544298 | Issue Tracking Third Party Advisory |
https://access.redhat.com/security/cve/cve-2018-1059 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1267 | Third Party Advisory |
https://usn.ubuntu.com/3642-1/ | Third Party Advisory |
https://usn.ubuntu.com/3642-2/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2038 | |
https://access.redhat.com/errata/RHSA-2018:2102 | |
https://access.redhat.com/errata/RHSA-2018:2524 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-04-24 11:29
Updated : 2021-08-04 10:15
NVD link : CVE-2018-1059
Mitre link : CVE-2018-1059
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
redhat
- enterprise_linux
- openstack
- virtualization
- virtualization_manager
- enterprise_linux_fast_datapath
- openshift
- ceph_storage
dpdk
- data_plane_development_kit
canonical
- ubuntu_linux