Bug 1544298 (CVE-2018-1059) - CVE-2018-1059 dpdk: Information exposure in unchecked guest physical to host virtual address translations
Summary: CVE-2018-1059 dpdk: Information exposure in unchecked guest physical to host ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-1059
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: 1536392 (view as bug list)
Depends On: 1502612 1537289 1544307 1544308 1544309 1555176 1555177 1555178 1555179 1555180 1555181 1563937 1570865 1570866 1571352 1571361 1578945 1578946 1578947 1578948 1910516
Blocks: 1537295
TreeView+ depends on / blocked
 
Reported: 2018-02-12 02:02 UTC by Sam Fowler
Modified: 2021-02-17 00:50 UTC (History)
50 users (show)

Fixed In Version: dpdk 16.11.6, dpdk 17.08.2, dpdk 17.11.2, dpdk 18.02.1
Clone Of:
Environment:
Last Closed: 2019-06-08 03:39:36 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1267 0 None None None 2018-04-30 09:59:45 UTC
Red Hat Product Errata RHSA-2018:2038 0 None None None 2018-06-26 18:41:03 UTC
Red Hat Product Errata RHSA-2018:2102 0 None None None 2018-06-27 23:33:39 UTC
Red Hat Product Errata RHSA-2018:2524 0 None None None 2018-08-20 12:56:11 UTC

Description Sam Fowler 2018-02-12 02:02:08 UTC
The DPDK vhost-user interface does not check all the requested guest physical range is mapped and contiguous when performing Guest Physical Adresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory.

Comment 5 Cedric Buissart 2018-03-01 10:14:44 UTC
Statement:

Red Hat OpenStack Platform versions 7 to 9 provided openvswitch-dpdk as a technical preview for customers, it was provided without support and is not intended on being deployed in production.

Red Hat Ceph Storage version 3 provides ceph bundled with DPDK as a technical preview for customers. It was provided without support and is not intended on being deployed in production.

Comment 8 Sandro Bonazzola 2018-04-20 14:51:00 UTC
Is the vulnerability fixed upstream? Which version does / will include the fix?

Comment 9 Sandro Bonazzola 2018-04-20 14:54:22 UTC
Is dpdk-17.11-7.el7 included in RHEL 7.5 affected? I've no access to bug #1555179 (and I don't understand why)

Comment 10 Maxime Coquelin 2018-04-20 14:58:10 UTC
Hi Sandro,

(In reply to Sandro Bonazzola from comment #8)
> Is the vulnerability fixed upstream? Which version does / will include the
> fix?

The fix will be delivered on DPDK upstream on Monday around 1pm UTC in:
v16.11.6
v17.11.2
upstream master (will be v18.05).

(In reply to Sandro Bonazzola from comment #9)
> Is dpdk-17.11-7.el7 included in RHEL 7.5 affected?

Yes, all current dpdk versions are affected.

> I've no access to bug
> #1555179 (and I don't understand why)

I think this is because it is still under embargo.

Comment 12 Pedro Sampaio 2018-04-23 14:51:31 UTC
Upstream fixed releases:

- v16.11.6 (LTS): https://fast.dpdk.org/rel/dpdk-16.11.6.tar.xz
- v17.08.2: https://fast.dpdk.org/rel/dpdk-17.08.2.tar.xz
- v17.11.2 (LTS): https://fast.dpdk.org/rel/dpdk-17.11.2.tar.xz
- v18.02.1: https://fast.dpdk.org/rel/dpdk-18.02.1.tar.xz

Comment 13 Pedro Sampaio 2018-04-23 14:52:26 UTC
Created dpdk tracking bugs for this issue:

Affects: fedora-all [bug 1570865]

Comment 15 Joshua Padman 2018-04-27 14:31:19 UTC
Acknowledgments:

Name: Maxime Coquelin (Red Hat)

Comment 16 errata-xmlrpc 2018-04-30 09:59:27 UTC
This issue has been addressed in the following products:

  Fast Datapath for RHEL 7

Via RHSA-2018:1267 https://access.redhat.com/errata/RHSA-2018:1267

Comment 19 Maxime Coquelin 2018-06-15 12:51:12 UTC
No specific test for this one,
you can run existing vhost-user tests to ensure there is no regression 
introduced. This is what was done for ovs-dpdk.

Comment 20 Jean-Tsung Hsiao 2018-06-15 12:54:40 UTC
(In reply to Maxime Coquelin from comment #19)
> No specific test for this one,
> you can run existing vhost-user tests to ensure there is no regression 
> introduced. This is what was done for ovs-dpdk.

OK.
Thanks!
Jean

Comment 22 Joshua Padman 2018-06-18 12:21:51 UTC
External References:

https://access.redhat.com/security/cve/CVE-2018-1059

Comment 23 errata-xmlrpc 2018-06-26 18:40:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extras

Via RHSA-2018:2038 https://access.redhat.com/errata/RHSA-2018:2038

Comment 24 errata-xmlrpc 2018-06-27 23:33:18 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2018:2102 https://access.redhat.com/errata/RHSA-2018:2102

Comment 25 errata-xmlrpc 2018-08-20 12:55:51 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:2524 https://access.redhat.com/errata/RHSA-2018:2524

Comment 26 Maxime Coquelin 2019-06-24 19:23:33 UTC
*** Bug 1536392 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.