Vulnerability Details CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 60.7%
CVSS Severity
CVSS v3 Score 8.6
Products affected by CVE-2022-2132
-
cpe:2.3:a:dpdk:data_plane_development_kit:-
-
cpe:2.3:a:dpdk:data_plane_development_kit:1.7.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:1.8.0
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.04
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.07
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.07.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.07.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.10
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.11
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.3
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.4
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.5
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.6
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.7
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.8
-
cpe:2.3:a:dpdk:data_plane_development_kit:16.11.9
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.02
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.02.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.05
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.05.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.05.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.08
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.08.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.08.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.3
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.4
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.5
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.6
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.7
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.8
-
cpe:2.3:a:dpdk:data_plane_development_kit:17.11.9
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.02
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.02.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.02.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.05
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.08
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.08.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.10
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.3
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.4
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.11.5
-
cpe:2.3:a:dpdk:data_plane_development_kit:18.15.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:19.02
-
cpe:2.3:a:dpdk:data_plane_development_kit:19.05
-
cpe:2.3:a:dpdk:data_plane_development_kit:19.08
-
cpe:2.3:a:dpdk:data_plane_development_kit:19.08.1
-
cpe:2.3:a:dpdk:data_plane_development_kit:19.08.2
-
cpe:2.3:a:dpdk:data_plane_development_kit:2.0.0
-
cpe:2.3:a:dpdk:data_plane_development_kit:2.1.0
-
cpe:2.3:a:dpdk:data_plane_development_kit:2.2.0
-
cpe:2.3:a:dpdk:data_plane_development_kit:20.02
-
cpe:2.3:a:dpdk:data_plane_development_kit:20.05
-
cpe:2.3:a:dpdk:data_plane_development_kit:21.02
-
cpe:2.3:a:dpdk:data_plane_development_kit:21.05
-
cpe:2.3:a:dpdk:data_plane_development_kit:21.08
-
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0
-
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0
-
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0
-
cpe:2.3:a:redhat:openshift_container_platform:4.0
-
cpe:2.3:a:redhat:openstack_platform:13.0
-
cpe:2.3:a:redhat:virtualization:4.0
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:fedoraproject:fedora:36
-
cpe:2.3:o:redhat:enterprise_linux:7.0
-
cpe:2.3:o:redhat:enterprise_linux:8.0
-
cpe:2.3:o:redhat:enterprise_linux:9.0