Public Date:
1544298: CVE-2018-1059 dpdk: Information exposure in unchecked guest physical to host virtual address translations
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory.

Find out more about CVE-2018-1059 from the MITRE CVE dictionary dictionary and NIST NVD.


Red Hat OpenStack Platform versions 7 to 9 provided openvswitch-dpdk as a technical preview for customers, it was provided without support and is not intended on being deployed in production.

Red Hat Ceph Storage version 3 provides ceph bundled with DPDK as a technical preview for customers. It was provided without support and is not intended on being deployed in production.

CVSS v3 metrics

CVSS3 Base Score 6.1
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Changed
Confidentiality High
Integrity Impact None
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 Extras (dpdk) RHSA-2018:2038 2018-06-26
Channel to provide early releases to layered products (openvswitch) RHSA-2018:1267 2018-04-30
Red Hat OpenStack Platform 10 (openvswitch) RHSA-2018:2102 2018-06-28
Red Hat OpenStack Platform 12.0 (openvswitch) RHSA-2018:2524 2018-08-20
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts RHSA-2018:1267 2018-04-30
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


This issue was discovered by Maxime Coquelin (Red Hat).

External References

Last Modified