From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by dpdk.org (Postfix) with ESMTP id 27A262B8B for ; Mon, 23 Apr 2018 17:56:00 +0200 (CEST) Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 684864072CFC for ; Mon, 23 Apr 2018 15:55:59 +0000 (UTC) Received: from [10.36.112.58] (ovpn-112-58.ams2.redhat.com [10.36.112.58]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 07DDA83B9C for ; Mon, 23 Apr 2018 15:55:58 +0000 (UTC) From: Maxime Coquelin To: announce@dpdk.org Message-ID: Date: Mon, 23 Apr 2018 17:55:57 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Mon, 23 Apr 2018 15:55:59 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Mon, 23 Apr 2018 15:55:59 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'maxime.coquelin@redhat.com' RCPT:'' X-Mailman-Approved-At: Mon, 23 Apr 2018 17:57:35 +0200 Subject: [dpdk-announce] Vhost-user CVE-2018-1059 X-BeenThere: announce@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK announcements List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Apr 2018 15:56:00 -0000 Dear users, All versions of DPDK's Vhost-user library are vulnerable to out-of-bound accesses initiated by a buggy or malicious guest. This vulnerability has been assigned CVE-2018-1059. Users are strongly encouraged to upgrade to the latest releases: - v16.11.6 (LTS): https://fast.dpdk.org/rel/dpdk-16.11.6.tar.xz - v17.08.2: https://fast.dpdk.org/rel/dpdk-17.08.2.tar.xz - v17.11.2 (LTS): https://fast.dpdk.org/rel/dpdk-17.11.2.tar.xz - v18.02.1: https://fast.dpdk.org/rel/dpdk-18.02.1.tar.xz Starting DPDK v17.11, rte_vhost_gpa_to_vva() API was introduced for external Vhost backends to be able to translate guest's physical addresses to Vhost process's virtual addresses. This API is now marked as deprecated, and users must replace its use with the new rte_vhost_va_from_guest_pa() API. This new API takes an extra length parameter that must be checked properly. Patches fixing this vulnerability will soon be posted to the dev mailing-list for upstream master, and to the stable mailing-list for stable branches. Kind regards, Maxime