CVE-2018-1059

The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
ADJACENT_NETWORK
HIGH
NONE
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
VendorProductVersion
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
redhatceph_storage
3.0
redhatenterprise_linux_fast_datapath
7.0
redhatopenshift
3.0
redhatvirtualization
4.0
redhatvirtualization
4.1
redhatvirtualization_manager
4.1
redhatenterprise_linux
7.0
dpdkdata_plane_development_kit
𝑥
< 18.02.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dpdk
bullseye
20.11.10-1~deb11u1
fixed
bullseye (security)
20.11.6-1~deb11u1
fixed
bookworm
22.11.5-1~deb12u1
fixed
sid
23.11.2-2
fixed
trixie
23.11.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dpdk
noble
Fixed 17.11.2-1
released
mantic
Fixed 17.11.2-1
released
lunar
Fixed 17.11.2-1
released
kinetic
Fixed 17.11.2-1
released
jammy
Fixed 17.11.2-1
released
impish
Fixed 17.11.2-1
released
hirsute
Fixed 17.11.2-1
released
groovy
Fixed 17.11.2-1
released
focal
Fixed 17.11.2-1
released
eoan
Fixed 17.11.2-1
released
disco
Fixed 17.11.2-1
released
cosmic
Fixed 17.11.2-1
released
bionic
Fixed 17.11.2-1ubuntu0.1
released
artful
Fixed 17.05.2-0ubuntu1.1
released
xenial
needed
trusty
dne