CVE-2018-1059
Publication date 24 April 2018
Last updated 18 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| dpdk | 25.10 questing |
Fixed 17.11.2-1
|
| 25.04 plucky |
Fixed 17.11.2-1
|
|
| 24.04 LTS noble |
Fixed 17.11.2-1
|
|
| 22.04 LTS jammy |
Fixed 17.11.2-1
|
|
| 20.04 LTS focal |
Fixed 17.11.2-1
|
|
| 18.04 LTS bionic |
Fixed 17.11.2-1ubuntu0.1
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty | Not in release |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Adjacent |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3642-1
- DPDK vulnerability
- 9 May 2018
- USN-3642-2
- DPDK vulnerability
- 16 May 2018