CVE-2022-2132

A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
References
Link Resource
https://bugs.dpdk.org/show_bug.cgi?id=1031 Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2099475 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html Mailing List Third Party Advisory
https://bugs.dpdk.org/show_bug.cgi?id=1031 Exploit Issue Tracking Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2099475 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () https://bugs.dpdk.org/show_bug.cgi?id=1031 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://bugs.dpdk.org/show_bug.cgi?id=1031 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2099475 - Exploit, Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2099475 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html - Mailing List, Third Party Advisory

06 Sep 2022, 18:20

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-31 16:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2132

Mitre link : CVE-2022-2132

CVE.ORG link : CVE-2022-2132


JSON object : View

Products Affected

dpdk

  • data_plane_development_kit

fedoraproject

  • fedora

redhat

  • enterprise_linux
  • openstack_platform
  • virtualization
  • openshift_container_platform
  • enterprise_linux_fast_datapath

debian

  • debian_linux
CWE
CWE-791

Incomplete Filtering of Special Elements

NVD-CWE-Other