dpdk is vulnerable to information disclosure. A malicious guest is able to expose the memory of vhost-user
backend process memory. This is due to lack of verification for all requested guest physical ranges be mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations.
access.redhat.com/errata/RHSA-2018:1267
access.redhat.com/errata/RHSA-2018:2038
access.redhat.com/errata/RHSA-2018:2102
access.redhat.com/errata/RHSA-2018:2524
access.redhat.com/security/cve/cve-2018-1059
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1544298
bugzilla.redhat.com/show_bug.cgi?id=1560628
usn.ubuntu.com/3642-1/
usn.ubuntu.com/3642-2/