The DPDK vhost-user interface does not check all the requested guest physical range is mapped and contiguous when performing Guest Physical Adresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory.
Statement: Red Hat OpenStack Platform versions 7 to 9 provided openvswitch-dpdk as a technical preview for customers, it was provided without support and is not intended on being deployed in production. Red Hat Ceph Storage version 3 provides ceph bundled with DPDK as a technical preview for customers. It was provided without support and is not intended on being deployed in production.
Is the vulnerability fixed upstream? Which version does / will include the fix?
Is dpdk-17.11-7.el7 included in RHEL 7.5 affected? I've no access to bug #1555179 (and I don't understand why)
Hi Sandro, (In reply to Sandro Bonazzola from comment #8) > Is the vulnerability fixed upstream? Which version does / will include the > fix? The fix will be delivered on DPDK upstream on Monday around 1pm UTC in: v16.11.6 v17.11.2 upstream master (will be v18.05). (In reply to Sandro Bonazzola from comment #9) > Is dpdk-17.11-7.el7 included in RHEL 7.5 affected? Yes, all current dpdk versions are affected. > I've no access to bug > #1555179 (and I don't understand why) I think this is because it is still under embargo.
Upstream fixed releases: - v16.11.6 (LTS): https://fast.dpdk.org/rel/dpdk-16.11.6.tar.xz - v17.08.2: https://fast.dpdk.org/rel/dpdk-17.08.2.tar.xz - v17.11.2 (LTS): https://fast.dpdk.org/rel/dpdk-17.11.2.tar.xz - v18.02.1: https://fast.dpdk.org/rel/dpdk-18.02.1.tar.xz
Created dpdk tracking bugs for this issue: Affects: fedora-all [bug 1570865]
Acknowledgments: Name: Maxime Coquelin (Red Hat)
This issue has been addressed in the following products: Fast Datapath for RHEL 7 Via RHSA-2018:1267 https://access.redhat.com/errata/RHSA-2018:1267
No specific test for this one, you can run existing vhost-user tests to ensure there is no regression introduced. This is what was done for ovs-dpdk.
(In reply to Maxime Coquelin from comment #19) > No specific test for this one, > you can run existing vhost-user tests to ensure there is no regression > introduced. This is what was done for ovs-dpdk. OK. Thanks! Jean
External References: https://access.redhat.com/security/cve/CVE-2018-1059
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extras Via RHSA-2018:2038 https://access.redhat.com/errata/RHSA-2018:2038
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2018:2102 https://access.redhat.com/errata/RHSA-2018:2102
This issue has been addressed in the following products: Red Hat OpenStack Platform 12.0 (Pike) Via RHSA-2018:2524 https://access.redhat.com/errata/RHSA-2018:2524
*** Bug 1536392 has been marked as a duplicate of this bug. ***