CVE-2018-1059
Publication date 24 April 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
Status
Package | Ubuntu Release | Status |
---|---|---|
dpdk | 24.10 oracular |
Fixed 17.11.2-1
|
24.04 LTS noble |
Fixed 17.11.2-1
|
|
22.04 LTS jammy |
Fixed 17.11.2-1
|
|
20.04 LTS focal |
Fixed 17.11.2-1
|
|
18.04 LTS bionic |
Fixed 17.11.2-1ubuntu0.1
|
|
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 · Medium |
Attack vector | Adjacent |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3642-1
- DPDK vulnerability
- 9 May 2018
- USN-3642-2
- DPDK vulnerability
- 16 May 2018