First published: Mon Feb 12 2018(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dpdk | <16.11.6 | 16.11.6 |
redhat/dpdk | <17.08.2 | 17.08.2 |
redhat/dpdk | <17.11.2 | 17.11.2 |
redhat/dpdk | <18.02.1 | 18.02.1 |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Redhat Ceph Storage | =3.0 | |
Redhat Enterprise Linux Fast Datapath | =7.0 | |
Redhat Openshift | =3.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =11 | |
Redhat Openstack | =12 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization | =4.1 | |
Redhat Virtualization Manager | =4.1 | |
Redhat Enterprise Linux | =7.0 | |
Dpdk Data Plane Development Kit | <18.02.1 | |
debian/dpdk | 20.11.10-1~deb11u1 20.11.6-1~deb11u1 22.11.5-1~deb12u1 23.11.1-2 23.11.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1059 is a vulnerability in the DPDK vhost-user interface that could allow a malicious guest to expose vhost-user backend process memory.
Yes, there are patches available to fix the CVE-2018-1059 vulnerability.
All versions of DPDK before 16.11.6, 17.08.2, 17.11.2, and 18.02.1 are affected by CVE-2018-1059.
The severity level of CVE-2018-1059 is medium, with a CVSS severity score of 6.1.
You can find more information about CVE-2018-1059 on the Red Hat website in the provided references.