Resource Exhaustion The advisory has been revoked - it doesn't affect any version of package openvswitch-controller  (opens in a new tab)


Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-OPENVSWITCHCONTROLLER-2808310
  • published4 May 2022
  • disclosed29 Apr 2022

Introduced: 29 Apr 2022

CVE-2022-0669  (opens in a new tab)
CWE-400  (opens in a new tab)
CWE-770  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:7.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openvswitch-controller package and not the openvswitch-controller package as distributed by RHEL.

A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.