From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id AD3C8A034C for ; Mon, 9 May 2022 19:51:14 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6870942822; Mon, 9 May 2022 19:51:09 +0200 (CEST) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 5696140689 for ; Thu, 5 May 2022 03:47:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1651715273; x=1683251273; h=from:to:subject:date:message-id:mime-version; bh=61DMqBUHA8xZevPvpSsLj2dutDcPVNwJLDFzWwuYraE=; b=EZEc3WJqYtLATuzGWOcuDzOplYcj/8weLb3xhoW7qdsMokYUIZg/3mb8 nT7dbvgrgbghLlKNtJq7Qisd3Pr0uR4TB0/O994zbCnU3TiviRA37QRVM X3M3kyi2vCD7v5CFrBdMg+XdnCQjArZxwJuaTTUYCIo8U+eflJu2kXr8z nFx7EZRTZyk96pcgIZMlj41JJcJP70GYiMJlEynpPuFYxsyp+iL9qURyb 34gFgbyvJhO47p6Tha7aw6RLLGJar6Hx+50Yex1fg7YL4yDy36P/YPqzN NnO3qfzXjgVqbYCiZpBXGeX71AAZScEN4XQLvKH+np2uMIvi4GKgRh7Oy A==; X-IronPort-AV: E=McAfee;i="6400,9594,10337"; a="249938884" X-IronPort-AV: E=Sophos;i="5.91,199,1647327600"; d="scan'208,217";a="249938884" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 May 2022 18:47:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,199,1647327600"; d="scan'208,217";a="537103063" Received: from fmsmsx606.amr.corp.intel.com ([10.18.126.86]) by orsmga006.jf.intel.com with ESMTP; 04 May 2022 18:47:52 -0700 Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx606.amr.corp.intel.com (10.18.126.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Wed, 4 May 2022 18:47:51 -0700 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27 via Frontend Transport; Wed, 4 May 2022 18:47:51 -0700 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.46) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.27; Wed, 4 May 2022 18:46:42 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mvB++hAviRQSH11voQ+B1ghrXQupIPdEhqCamsz2b+bZas2CKPk2vqDx/axONTsbW5XGlhTKQxQQ9mSVdLuiwR3j1SZ6uzV3qPuQOcajMq10cnD+/iMjSROY0FphwiG55NfDG3ML8FLefpwwUCY7bBHA26PdLgrAxNjqDBqF7Iew3mPK5iBAerpcTTTVblwGHvenewA+ef20KTpc46bh7XbpjuVqsmjtlzKn/anM+fMP/LzorG+5GFb/JIiUzGDjRw7ko8CuQXZsEWGqLpmV+oEUTXlTefUDsDnRb+JIrFFhXbStkJUOjmSSFAa3t5dMeK5fJyRdmk1MZSC22rGVYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=s9+fLD4NJyaM5In/WZ5GlmndWC+FePG4XPt7SFWTo2I=; b=ZRlA1vBFynDQ5ArnQJ7ljiyOphOQeQyHI4faS0iL/AcOYKnooen8xCw4MogrT/WHN/NXTpXan85IBfag5fcPnE3YrcHlyoVIAUJj6txRQ9AEpb7++rcCjm3ACKkLV0KIUadO3gBHY8dQpNSKFp2DtwtwjfigcdQD80+pzplRnjlzpx8prGFU8AgLDk/grnw14G7KnXob0iHZ3l+Vhjnr6+fRtGrKbnyxlDWJZrJrTaoAU6AIrBYJ3ZVgpBYugTp9SGpmpmHa0dWO7bPp6AzvXZcU9mNspxGR5xgviPIXGoVZIyE7W5Q5naaX+atLZ1f7y/d3u2bbeJ/yNZdD4bf2hA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from SJ0PR11MB5006.namprd11.prod.outlook.com (2603:10b6:a03:2db::22) by MN2PR11MB4726.namprd11.prod.outlook.com (2603:10b6:208:269::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5206.24; Thu, 5 May 2022 01:46:40 +0000 Received: from SJ0PR11MB5006.namprd11.prod.outlook.com ([fe80::e04b:d4a5:66f:12ee]) by SJ0PR11MB5006.namprd11.prod.outlook.com ([fe80::e04b:d4a5:66f:12ee%9]) with mapi id 15.20.5206.025; Thu, 5 May 2022 01:46:40 +0000 From: "Jiang, Cheng1" To: "announce@dpdk.org" Subject: CVE-2022-0669 Release Notice Thread-Topic: CVE-2022-0669 Release Notice Thread-Index: AdhgIdN71jCR3HapQQGxlNL6vxjFYw== Date: Thu, 5 May 2022 01:46:40 +0000 Message-ID: Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-reaction: no-action dlp-version: 11.6.500.15 dlp-product: dlpe-windows authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 397effd1-1acf-41f6-5fd9-08da2e3919b9 x-ms-traffictypediagnostic: MN2PR11MB4726:EE_ x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: m+IImj4EG4rSVB1akHI1o4fO37GlADHZBAZL39nZ5i9Gf/V2iA3B3/Rkr8VUgKsMgpy9kAhRmIxBQD8q+bKaogIvShZeTBD7cO5NiiN/Kq0aVp3W4as+qIthbKKgdB9L6AA2IhI2yXgNCDfj0Lu3oHQ8ODdkiW+JaakBR6kVEGyEwlWX110jR1kb/za9o9uHHqt8iNaQl9XKA3AkzXfuU8CDUgL24ooPn3ZUyXXIQg8G2e7mqwgBwU8j9jxKZIvfup2vWUg8xjAOOQyoPbbrkVPt/MuQGKW1AYWwf5D6pirQP7R8L+NhL9vUGrdpzw4KcnRqyIpxcguG2EAAcHCoYPMg7kLKRQ+jwO+HhctGPJjR+jWjoP5qS9QXvwNd3OUNyyyZ3nHvjo/4uxhtFayeRsyg64foZ8/2SfORBHOJ2eytoDcglFnXT5WFbRGoYZDMTjlQzs76QAmdTHaElsaQyDl0Ee2UN+Otso+wS5IjyNF6X7ZECNHuNNZyhl0K3kLrkjEl0hnHgG/7r7MhDn46oWGFk+5m635IcZuVDm/mgKo1GT6wYO/dYdHtB4q9j0bU0NASrN0gW6TTBdgKrp1YLfQIMFFopZFz/+BqwTJs4rhqrx34A4QXNrgJUbzWb1pwQX4jXVLT3HMZC9Ej3xSRAX1mW4HZCz4spp0XKaZt/j6mwbPZWA3lmGzHijx+3tl+syOn2Az4jMEWXx03F/q8PwPwBx5Hj1PnHjhO53c4a5XOpRCFjRu1Ot735mpzydNdQE1oRonVg+NiO+70MKyK5YIOoDmts5jMgxj70/ISvn0= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5006.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(7696005)(83380400001)(966005)(86362001)(6916009)(15650500001)(2906002)(508600001)(6506007)(76116006)(52536014)(33656002)(8676002)(66556008)(66476007)(66446008)(8936002)(64756008)(26005)(5660300002)(9686003)(316002)(55016003)(38100700002)(38070700005)(4744005)(186003)(166002)(82960400001)(122000001)(71200400001)(66946007); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?gnvdEOktNfaPOfizBe7kjHEzn9lktHi4rKuEuSUWcjwqg4VSsrRBArDj1w3w?= =?us-ascii?Q?Z5KpV0HQPoGemKGE5nxSD/cCAlW3Ee9OY82QTUxtHw/oNb5E3t58bQjyY0fd?= =?us-ascii?Q?48uFRo0O+LKf7NcpybvmuOS4OhVVPe5bv6dADCdzr7QjXERYU88NqVzeQ7gd?= =?us-ascii?Q?wDJkLpBkEt+xN0LaY0WS5/kt3uhtf+7BAnNdMpa+9YTNVaqYFoiv+j1sYr4v?= =?us-ascii?Q?HObZ/z04gQy5xL7x2V+kA2xVtQBxwUKHdV4gZgcJ/+L5cf/u7rdLZ8ObNQ3F?= =?us-ascii?Q?RL6HPFPxd4rLjDR0JESFcG/mynK1CQ2prRCUlldrsXdiIMPBAM5p6uy7sPWM?= =?us-ascii?Q?pq1yy5os9KAPhJNiA/sN+Fc3ZxTYG6u5f7EOtT+9E4IiMBFqL84EZBC4J8T3?= =?us-ascii?Q?ZLMCUdD7tFS7K3TDV0axDsV58WXwjBVZsKl+r4GOz+47pPj1DvStTL17n5DH?= =?us-ascii?Q?6kQ+r5l41tbkBtk6TuNVaRAHTIU8LP+5o7Z7W5wdnRUBeFY38YAfT5CNQNTM?= =?us-ascii?Q?1FFQyRDZMeiQSkTEZBAqkpEChpPKHBb9dBNm3NrGLHTSHC6AObKPkJbUz88s?= =?us-ascii?Q?F6R/H1mLAECsJBFZGloc95/yMrrdrQoBLYUm5epfmhMsW1hHz5kZKxqZelfS?= =?us-ascii?Q?VcuicIdTCKYOzgnd2I8IJuge9Mr1BSwIjMYyauB6dctKk7FG7F3a9gPl9V/r?= =?us-ascii?Q?IBHsfDgcDcTZfkx2D5FjP3ghSUmiIy2YDspZIOFj/hBCmNamXAU2AvKLCOG3?= =?us-ascii?Q?abv5CP1bHkgBIbEq+lUiJ1sBO3Tp4cEP4PJKBU3cx4V6PZ6HHQ1PL9J+YVsy?= =?us-ascii?Q?5LYQIOAOkKs9Sf1T1mY1gb8SEGYrOXqxMTk9RwcAkGgMokGPeKaW0O+OP3v3?= =?us-ascii?Q?AaaYOy+SPB2X0wbRn3NjGUWFwnfOweWxrFhLbfGxSDhvt/VafOM28S9DZtFZ?= =?us-ascii?Q?HlZYQMP5njDgoRaQjBSxDxcTkhEDBsfpB1yMWF6sYXsbJCx22O1e0h68kbS5?= =?us-ascii?Q?niObdHhSbIowYu7yNblRouHT+wZwGdFnM+9uxub+aXNW8/eA19juHqHoCt3N?= =?us-ascii?Q?3C1jlJFVv0tiyKmPoS20j+E/xnGbW5k0hQLbhGz2NBC0rZpvm7nMUVuI+FEw?= =?us-ascii?Q?up59sb1vtP0vNlIZVP0xH/1OJH7CHlnkKNlQcMmI2w8FnZgwC/h7EvyPkrbs?= =?us-ascii?Q?KrGVX0b8+FJP0Aw/NLHTHtNRGagHD9rDTIoBH6lnbpXhUvIq8jZ1kDa/jkWA?= =?us-ascii?Q?WbnvwlkWJDnbeHLZajtB+JRFjF8IiRB/CRYu456Cf3u7t0gzkOV6R1+3Gqko?= =?us-ascii?Q?eASsVowHohhhaSUcK/IyAi4rBoNfmFUxQ7UZyPUI16hc7VkrjAo0luDgc6si?= =?us-ascii?Q?A9jlg9faZ2tzsT35KcUwR84KpWXeQmnmqYaUDtvlKWNKtN9A1tSXMCr3RgqD?= =?us-ascii?Q?+GifCaLIFOPAzwe7EQA6CVzBZHIEmxsesQArBdI6fACN0DL1Y6L95GPqbyzi?= =?us-ascii?Q?aWwRqco6ufVtGiEDV3UwVHo00RNF9Iy3ONIy/24x9EwMYg5xvGRKmyNzzsO3?= =?us-ascii?Q?bjLWqCgPtKz7RpuC1rNRaYfUTm5tezE/ZpBjoR9oOy6jgGu6jo6K4g60h/Xf?= =?us-ascii?Q?YQKXeoTR3ukua8S8DVTzWLjKkQWQXqhDdmdlwISjfcqR6jIOUAT8DdL498kO?= =?us-ascii?Q?Dq/lPOFOauAlaQj/QFunEXMtiNWliVqlBjFCdZYP47Sy3loaLGYDYxvJHiSL?= =?us-ascii?Q?Fa8H1UmzsA=3D=3D?= Content-Type: multipart/alternative; boundary="_000_SJ0PR11MB50061A9A8FE61C6235927742DCC29SJ0PR11MB5006namp_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5006.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 397effd1-1acf-41f6-5fd9-08da2e3919b9 X-MS-Exchange-CrossTenant-originalarrivaltime: 05 May 2022 01:46:40.5470 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ahjNt0Gp0aywy0Tydj/yiwJiO+kK6jNDirbJOgZGdhFuIg8aFsRTGQtxfBefy5zSRUTZAfHsXbQByW7Bh7W+5g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4726 X-OriginatorOrg: intel.com X-Mailman-Approved-At: Mon, 09 May 2022 19:51:08 +0200 X-BeenThere: announce@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK announcements List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: announce-bounces@dpdk.org --_000_SJ0PR11MB50061A9A8FE61C6235927742DCC29SJ0PR11MB5006namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable A vulnerability was fixed in DPDK. Some downstream stakeholders were warned in advance in order to coordinate the release of fixes and reduce the vulnerability window. It's an issue in the handling of vhost-user inflight type messages. A malic= ious vhost-user master can attach an unexpected number of fds as ancillary = data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages th= at are not closed by the vhost-user slave. By sending such messages continu= ously, the vhost-user master could exhaust available fd in the vhost-user s= lave process and lead to a DoS. Commits: af74f7db384e on the main branch CVE: CVE-2022-0669 Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=3D922 Severity: 6.5 (Medium) CVSS scores: 3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H --_000_SJ0PR11MB50061A9A8FE61C6235927742DCC29SJ0PR11MB5006namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

A vulnerability was fixed in DPDK.

Some downstream stakeholders were warned in advance<= o:p>

in order to coordinate the release of fixes

and reduce the vulnerability window.

 

It’s an issue in the handling of vhost-user in= flight type messages. A malicious vhost-user master can attach an unexpecte= d number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USE= R_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the= vhost-user master could exhaust available fd in the vhost-user slave proce= ss and lead to a DoS.

 

Commits: af74f7db384e on the main branch<= /p>

 

CVE: CVE-2022-0669

Bugzilla: https://bugs.dpdk.org/show_bug.cgi?id=3D922

Severity: 6.5 (Medium)

CVSS scores: 3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H=

 

--_000_SJ0PR11MB50061A9A8FE61C6235927742DCC29SJ0PR11MB5006namp_--