Executive Summary

Informations
Name CVE-2022-0669 First vendor Publication 2022-08-29
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Overall CVSS Score 6.5
Base Score 6.5 Environmental Score 6.5
impact SubScore 4 Temporal Score 6.5
Exploitabality Sub Score 2
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Changed Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0669

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9
Application 2
Application 1

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2022-0669
https://bugs.dpdk.org/show_bug.cgi?id=922
https://bugzilla.redhat.com/show_bug.cgi?id=2055793
https://github.com/DPDK/dpdk/commit/af74f7db384ed149fe42b21dbd7975f8a54ef227
https://security-tracker.debian.org/tracker/CVE-2022-0669
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-11-28 14:04:10
  • Multiple Updates
2022-09-02 00:27:11
  • Multiple Updates
2022-08-29 21:27:11
  • First insertion