U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-2132

Change History

Initial Analysis by NIST 9/06/2022 2:20:32 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:* versions up to (excluding) 19.11
     *cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:* versions from (including) 20.0 up to (excluding) 20.11
     *cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:* versions from (including) 21.0 up to (excluding) 21.11
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:enterprise_linux_fast_datapath:9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-Other
Changed Reference Type
https://bugs.dpdk.org/show_bug.cgi?id=1031 No Types Assigned
https://bugs.dpdk.org/show_bug.cgi?id=1031 Exploit, Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=2099475 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=2099475 Exploit, Issue Tracking, Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2022/09/msg00000.html Mailing List, Third Party Advisory