The DPDK vhost-user interface does not check to verify that all the
requested guest physical range is mapped and contiguous when performing
Guest Physical Addresses to Host Virtual Addresses translations. This may
lead to a malicious guest exposing vhost-user backend process memory. All
versions before 18.02.1 are vulnerable.
Source: dpdk (LP Ubuntu Debian)
Upstream:released (17.11.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (17.11.2-1ubuntu0.1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (17.11.2-1)
Ubuntu 19.04 (Disco Dingo):released (17.11.2-1)
More Information

Updated: 2019-03-19 11:27:13 UTC (commit 15472795df7e9de45b82f2d36b8b419b939f97b2)