-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5222-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 30, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : dpdk CVE ID : CVE-2022-2132 CVE-2022-28199 A buffer overflow was discovered in the vhost code of DPDK, a set of libraries for fast packet processing, which could result in denial of service or the execution of arbitrary code by malicious guests/containers. For the stable distribution (bullseye), these problems have been fixed in version 20.11.6-1~deb11u1. We recommend that you upgrade your dpdk packages. For the detailed security status of dpdk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dpdk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmMOWuAACgkQEMKTtsN8 TjbWhRAAhu6OGvEiRfQB/4/v5C9ht2ExWJ9orw9kHgdXtxbP9Vnu4KsI2mJuWeRl 2ZUZEeCSZNHjIf4HRkH8u/MEKsaSfbz98CIg2dQxCZAUc9Cy56JREAmak0NmKqYz vpBeozH8AkmuBhpvsGNUkLUKxic+NkWye91zhXQtGOglTy7vLFpz7n7fr1YWz14f r5+Klu/YlwgmBxRB1NDZCnyLrqkyoIIFV35N0q28egt5whHi0mLE2Xd01Pl1dMtf dHHS/5hYlvC7O5ja3N7GIws4JXJ0FoBPjXf0EFdw6NEgOejAjWK1ZmCH7A7koeyq UHgmWE5HgqFc98rx6n6vbGmSMbVEE09DhlFJ6tEgCfbEvpBwdIvVdxd1T/qtwMMs pXw4gu6uaRqTOdzHnbKefQDpDHDEocz6i1QwbpdrXpgLLPjHevcg0ChfmFrFJAlP PsG1+bp3o8t/Dcm4fCf1pyW1Mmo9F2X2LAxGlBKAtjKjVkwjrHVw9CMGr/WXLh3Q 7fwV1idlnoeW390NOR9G9ONM/KjrMX6Tml4AYALcu4v2gAFzw0CE7AcojHKnziaG 1yQ+W8Kv+4ZdqEvcyM0/Yaf6bjGjhMSt3oo34J+rgUxrhZ6rk/yM2Wzw2wIbdcLw M9hbGWmbLls0gTfWw6Q6lgUSKD4FlDMaSzfB1sHlAd4lnjtgmiI= =fEEK -----END PGP SIGNATURE-----