{"id":"CVE-2022-2132","details":"A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.","modified":"2026-04-10T04:43:31.244675Z","published":"2022-08-31T16:15:10.770Z","related":["ALSA-2022:8263","ALSA-2023:0171","SUSE-SU-2022:3341-1","SUSE-SU-2022:3356-1","SUSE-SU-2022:3381-1","SUSE-SU-2022:3390-1","SUSE-SU-2022:3429-1","SUSE-SU-2022:3430-1","SUSE-SU-2024:0529-1","SUSE-SU-2024:0530-1","SUSE-SU-2024:0531-1","SUSE-SU-2024:0554-1","SUSE-SU-2024:0576-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099475"},{"type":"FIX","url":"https://bugs.dpdk.org/show_bug.cgi?id=1031"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dpdk/dpdk","events":[{"introduced":"0"},{"fixed":"7001c8fdb27357c67147c0a13cb3826e48c0f2bf"},{"introduced":"0"},{"fixed":"b1d36cf828771e28eb0130b59dcf606c2a0bc94d"},{"introduced":"0"},{"fixed":"45f04d88ae8fa6217812abdaa623d66b05fc7b6a"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"19.11"},{"introduced":"20.0"},{"fixed":"20.11"},{"introduced":"21.0"},{"fixed":"21.11"}]}}],"versions":["v1.2.3r0","v1.3.0r0","v1.3.1r0","v1.4.0r0","v1.4.1r0","v1.5.0r0","v1.5.1r0","v1.5.2r0","v1.6.0r0","v1.6.0r1","v1.6.0r2","v1.7.0","v1.7.0-rc1","v1.7.0-rc2","v1.7.0-rc3","v1.7.0-rc4","v1.7.1","v1.8.0","v1.8.0-rc1","v1.8.0-rc2","v1.8.0-rc3","v1.8.0-rc4","v1.8.0-rc5","v1.8.0-rc6","v16.04","v16.04-rc1","v16.04-rc2","v16.04-rc3","v16.04-rc4","v16.07","v16.07-rc1","v16.07-rc2","v16.07-rc3","v16.07-rc4","v16.07-rc5","v16.11","v16.11-rc1","v16.11-rc2","v16.11-rc3","v17.02","v17.02-rc1","v17.02-rc2","v17.02-rc3","v17.05","v17.05-rc1","v17.05-rc2","v17.05-rc3","v17.05-rc4","v17.08","v17.08-rc1","v17.08-rc2","v17.08-rc3","v17.08-rc4","v17.11","v17.11-rc1","v17.11-rc2","v17.11-rc3","v17.11-rc4","v18.02","v18.02-rc1","v18.02-rc2","v18.02-rc3","v18.02-rc4","v18.05","v18.05-rc1","v18.05-rc2","v18.05-rc3","v18.05-rc4","v18.05-rc5","v18.05-rc6","v18.08","v18.08-rc1","v18.08-rc2","v18.08-rc3","v18.11","v18.11-rc1","v18.11-rc2","v18.11-rc3","v18.11-rc4","v18.11-rc5","v19.02","v19.02-rc1","v19.02-rc2","v19.02-rc3","v19.02-rc4","v19.05","v19.05-rc1","v19.05-rc2","v19.05-rc3","v19.05-rc4","v19.08","v19.08-rc1","v19.08-rc2","v19.08-rc3","v19.08-rc4","v19.11","v19.11-rc1","v19.11-rc2","v19.11-rc3","v19.11-rc4","v2.0.0","v2.0.0-rc1","v2.0.0-rc2","v2.0.0-rc3","v2.1.0","v2.1.0-rc1","v2.1.0-rc2","v2.1.0-rc3","v2.1.0-rc4","v2.2.0","v2.2.0-rc1","v2.2.0-rc2","v2.2.0-rc3","v2.2.0-rc4","v20.02","v20.02-rc1","v20.02-rc2","v20.02-rc3","v20.02-rc4","v20.05","v20.05-rc1","v20.05-rc2","v20.05-rc3","v20.05-rc4","v20.08","v20.08-rc1","v20.08-rc2","v20.08-rc3","v20.08-rc4","v20.11","v20.11-rc1","v20.11-rc2","v20.11-rc3","v20.11-rc4","v20.11-rc5","v21.02","v21.02-rc1","v21.02-rc2","v21.02-rc3","v21.02-rc4","v21.05","v21.05-rc1","v21.05-rc2","v21.05-rc3","v21.05-rc4","v21.08","v21.08-rc1","v21.08-rc2","v21.08-rc3","v21.08-rc4","v21.11-rc1","v21.11-rc2","v21.11-rc3","v21.11-rc4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-2132.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}]}