CVE-2022-0669

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-0669
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0669.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-0669
Related
Published
2022-08-29T15:15:09Z
Modified
2024-10-12T08:48:17.780334Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOSTUSERGETINFLIGHTFD / VHOSTUSERSETINFLIGHTFD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.

References

Affected packages

Debian:11 / dpdk

Package

Name
dpdk
Purl
pkg:deb/debian/dpdk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.11.5-1~deb11u1

Affected versions

20.*

20.11-7
20.11.1-1
20.11.1-2
20.11.1-3
20.11.1-4
20.11.2-1
20.11.3-1~deb11u1
20.11.3-1
20.11.3-2
20.11.4-1
20.11.4-2~deb11u1
20.11.4-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / dpdk

Package

Name
dpdk
Purl
pkg:deb/debian/dpdk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.11.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / dpdk

Package

Name
dpdk
Purl
pkg:deb/debian/dpdk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.11.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/dpdk/dpdk

Affected ranges

Type
GIT
Repo
https://github.com/dpdk/dpdk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.2.3r0
v1.3.0r0
v1.3.1r0
v1.4.0r0
v1.4.1r0
v1.5.0r0
v1.5.1r0
v1.5.2r0
v1.6.0r0
v1.6.0r1
v1.6.0r2
v1.7.0
v1.7.0-rc1
v1.7.0-rc2
v1.7.0-rc3
v1.7.0-rc4
v1.7.1
v1.8.0
v1.8.0-rc1
v1.8.0-rc2
v1.8.0-rc3
v1.8.0-rc4
v1.8.0-rc5
v1.8.0-rc6

v16.*

v16.04
v16.04-rc1
v16.04-rc2
v16.04-rc3
v16.04-rc4
v16.07
v16.07-rc1
v16.07-rc2
v16.07-rc3
v16.07-rc4
v16.07-rc5
v16.11
v16.11-rc1
v16.11-rc2
v16.11-rc3

v17.*

v17.02
v17.02-rc1
v17.02-rc2
v17.02-rc3
v17.05
v17.05-rc1
v17.05-rc2
v17.05-rc3
v17.05-rc4
v17.08
v17.08-rc1
v17.08-rc2
v17.08-rc3
v17.08-rc4
v17.11
v17.11-rc1
v17.11-rc2
v17.11-rc3
v17.11-rc4

v18.*

v18.02
v18.02-rc1
v18.02-rc2
v18.02-rc3
v18.02-rc4
v18.05
v18.05-rc1
v18.05-rc2
v18.05-rc3
v18.05-rc4
v18.05-rc5
v18.05-rc6
v18.08
v18.08-rc1
v18.08-rc2
v18.08-rc3
v18.11
v18.11-rc1
v18.11-rc2
v18.11-rc3
v18.11-rc4
v18.11-rc5

v19.*

v19.02
v19.02-rc1
v19.02-rc2
v19.02-rc3
v19.02-rc4
v19.05
v19.05-rc1
v19.05-rc2
v19.05-rc3
v19.05-rc4
v19.08
v19.08-rc1
v19.08-rc2
v19.08-rc3
v19.08-rc4
v19.11
v19.11-rc1
v19.11-rc2
v19.11-rc3
v19.11-rc4

v2.*

v2.0.0
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc3
v2.1.0
v2.1.0-rc1
v2.1.0-rc2
v2.1.0-rc3
v2.1.0-rc4
v2.2.0
v2.2.0-rc1
v2.2.0-rc2
v2.2.0-rc3
v2.2.0-rc4

v20.*

v20.02
v20.02-rc1
v20.02-rc2
v20.02-rc3
v20.02-rc4
v20.05
v20.05-rc1
v20.05-rc2
v20.05-rc3
v20.05-rc4
v20.08
v20.08-rc1
v20.08-rc2
v20.08-rc3
v20.08-rc4
v20.11
v20.11-rc1
v20.11-rc2
v20.11-rc3
v20.11-rc4
v20.11-rc5

v21.*

v21.02
v21.02-rc1
v21.02-rc2
v21.02-rc3
v21.02-rc4
v21.05
v21.05-rc1
v21.05-rc2
v21.05-rc3
v21.05-rc4
v21.08
v21.08-rc1
v21.08-rc2
v21.08-rc3
v21.08-rc4
v21.11
v21.11-rc1
v21.11-rc2
v21.11-rc3
v21.11-rc4

v22.*

v22.03-rc1
v22.03-rc2
v22.03-rc3