Vulnerability Name: | CVE-2022-0669 (CCN-225846) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2022-05-05 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2022-05-05 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-09-01 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-0669 Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/CVE-2022-0669 Source: MISC Type: Patch, Vendor Advisory https://bugs.dpdk.org/show_bug.cgi?id=922 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2055793 Source: XF Type: UNKNOWN dpdk-cve20220669-dos(225846) Source: MISC Type: Patch, Third Party Advisory https://github.com/DPDK/dpdk/commit/af74f7db384ed149fe42b21dbd7975f8a54ef227 Source: CCN Type: oss-sec Mailing List, Thu, 5 May 2022 01:55:20 +0000 DPDK CVE-2022-0669 Release Notice Source: MISC Type: Patch, Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2022-0669 Source: CCN Type: DPDK Web site Home Source: CCN Type: Mend Vulnerability Database CVE-2022-0669 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |