Vulnerability Name: | CVE-2022-2132 (CCN-234704) | ||||||||||||||||||||||||
Assigned: | 2022-08-29 | ||||||||||||||||||||||||
Published: | 2022-08-29 | ||||||||||||||||||||||||
Updated: | 2022-09-06 | ||||||||||||||||||||||||
Summary: | A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK. | ||||||||||||||||||||||||
CVSS v3 Severity: | 8.6 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) 7.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
7.5 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-Other CWE-770 | ||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-2132 Source: MISC Type: Exploit, Issue Tracking, Patch, Vendor Advisory https://bugs.dpdk.org/show_bug.cgi?id=1031 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2099475 Source: XF Type: UNKNOWN dpdk-cve20222132-dos(234704) Source: CCN Type: DPDK GIT Repository vhost: discard too small descriptor chains Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update Source: CCN Type: oss-sec Mailing List, Mon, 29 Aug 2022 20:12:18 +0200 CVE-2022-2132: DPDK copy_desc_to_mbuf() Vhost header vulnerability Source: CCN Type: Mend Vulnerability Database CVE-2022-2132 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |