-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5222-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 30, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dpdk
CVE ID : CVE-2022-2132 CVE-2022-28199
A buffer overflow was discovered in the vhost code of DPDK,
a set of libraries for fast packet processing, which could result
in denial of service or the execution of arbitrary code by malicious guests/containers.
For the stable distribution (bullseye), these problems have been fixed in version 20.11.6-1~deb11u1.
We recommend that you upgrade your dpdk packages.
For the detailed security status of dpdk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dpdk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmMOWuAACgkQEMKTtsN8 TjbWhRAAhu6OGvEiRfQB/4/v5C9ht2ExWJ9orw9kHgdXtxbP9Vnu4KsI2mJuWeRl 2ZUZEeCSZNHjIf4HRkH8u/MEKsaSfbz98CIg2dQxCZAUc9Cy56JREAmak0NmKqYz vpBeozH8AkmuBhpvsGNUkLUKxic+NkWye91zhXQtGOglTy7vLFpz7n7fr1YWz14f r5+Klu/YlwgmBxRB1NDZCnyLrqkyoIIFV35N0q28egt5whHi0mLE2Xd01Pl1dMtf dHHS/5hYlvC7O5ja3N7GIws4JXJ0FoBPjXf0EFdw6NEgOejAjWK1ZmCH7A7koeyq UHgmWE5HgqFc98rx6n6vbGmSMbVEE09DhlFJ6tEgCfbEvpBwdIvVdxd1T/qtwMMs pXw4gu6uaRqTOdzHnbKefQDpDHDEocz6i1QwbpdrXpgLLPjHevcg0ChfmFrFJAlP PsG1+bp3o8t/Dcm4fCf1pyW1Mmo9F2X2LAxGlBKAtjKjVkwjrHVw9CMGr/WXLh3Q 7fwV1idlnoeW390NOR9G9ONM/KjrMX6Tml4AYALcu4v2gAFzw0CE7AcojHKnziaG 1yQ+W8Kv+4ZdqEvcyM0/Yaf6bjGjhMSt3oo34J+rgUxrhZ6rk/yM2Wzw2wIbdcLw M9hbGWmbLls0gTfWw6Q6lgUSKD4FlDMaSzfB1sHlAd4lnjtgmiI=
=fEEK
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)