First published: Tue Jun 21 2022(Updated: )
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dpdk | <21.11 | 21.11 |
redhat/dpdk | <20.11 | 20.11 |
redhat/dpdk | <19.11 | 19.11 |
redhat/openvswitch2.11 | <0:2.11.3-96.2.el7fd | 0:2.11.3-96.2.el7fd |
redhat/openvswitch2.16 | <0:2.16.0-89.2.el8fd | 0:2.16.0-89.2.el8fd |
redhat/openvswitch2.17 | <0:2.17.0-37.3.el8fd | 0:2.17.0-37.3.el8fd |
redhat/openvswitch2.13 | <0:2.13.0-193.2.el8fd | 0:2.13.0-193.2.el8fd |
redhat/openvswitch2.15 | <0:2.15.0-113.2.el8fd | 0:2.15.0-113.2.el8fd |
redhat/openvswitch2.17 | <0:2.17.0-32.3.el9fd | 0:2.17.0-32.3.el9fd |
redhat/dpdk | <0:18.11.8-2.el7_9 | 0:18.11.8-2.el7_9 |
redhat/dpdk | <0:21.11-2.el8_7 | 0:21.11-2.el8_7 |
redhat/dpdk | <0:18.11.2-5.el8_1 | 0:18.11.2-5.el8_1 |
redhat/dpdk | <0:19.11-6.el8_2 | 0:19.11-6.el8_2 |
redhat/dpdk | <0:20.11-4.el8_4 | 0:20.11-4.el8_4 |
redhat/dpdk | <0:21.11-2.el8_6 | 0:21.11-2.el8_6 |
redhat/dpdk | <2:21.11.2-1.el9_1 | 2:21.11.2-1.el9_1 |
redhat/dpdk | <2:21.11-2.el9_0 | 2:21.11-2.el9_0 |
Dpdk Data Plane Development Kit | <19.11 | |
Dpdk Data Plane Development Kit | >=20.0<20.11 | |
Dpdk Data Plane Development Kit | >=21.0<21.11 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Redhat Enterprise Linux Fast Datapath | =7.0 | |
Redhat Enterprise Linux Fast Datapath | =8.0 | |
Redhat Enterprise Linux Fast Datapath | =9.0 | |
Redhat Openshift Container Platform | =4.0 | |
Redhat Openstack Platform | =13.0 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this vulnerability is CVE-2022-2132.
The severity of CVE-2022-2132 is high with a CVSS score of 8.6.
The affected software for CVE-2022-2132 includes DPDK versions up to 21.11, openvswitch2.11 up to 2.17, and various Redhat Linux distributions.
To fix CVE-2022-2132, update DPDK to version 21.11 or apply the recommended patches for your specific software or distribution.
You can find more information on CVE-2022-2132 in the provided references.