-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5833-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 17, 2024 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : dpdk CVE ID : CVE-2024-11614 A buffer overflow was discovered in the vhost code of DPDK, a set of libraries for fast packet processing, which could result in denial of service or the execution of arbitrary code by malicious guests/containers. For the stable distribution (bookworm), this problem has been fixed in version 22.11.7-1~deb12u1. We recommend that you upgrade your dpdk packages. For the detailed security status of dpdk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dpdk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdh9zgACgkQEMKTtsN8 TjaoxA/9HEVRaZE06MANQ/3ps+EYjOhrpLs5+aBAJXTOeS18eeyEQkfq2TtpaxqF /ojpa/jEBip+dnfE2Zn/5ovBkKFxEbboPZyw9+o/l2diofBzlNEz5/RNlkpYecXM lQ1lMC3HgUGicI/knXhhkqhClX6wxkgoHvaEXx+LZkGyBb81aU71z6H469oxcRap WZ1nMxBdmmcIJkxBVKuM9OiK+NjZVozw0v3YicQIWDFi3ZY+ofRfrITzSlaYCMeV IdGVqdixu7G3tWB62FBiauOfjlO/Fuhm6gL+CZ8x9DuoyZwYPxdIvSH27HkfaTZR V9Ar2m8NO1mWPAqc77W0U7quLKDnq2uVQlx2TTzz6qrNzwfUjvXnulH9yjTZwNav 3qgvATJ+Qbr6BohnAOclKsG6oc8g1FpW5mU7SKqZ8THofzySR3/q0iNfeo7aD1MJ MRCbdJCq10D/hm/6OFjyLoiF2mBZlnroGCwvIidO4zP2l9Xm1ea8WpaVqD77D2KR gS0W2hXW93Q488eNI7gYkILe0plSsya9Rhe060ySowc8gh3rGGkRqTlRZ5LAjWO8 rlL4ljcwIS2gmo7agGck0cNibG8QHbemBZrDVtyjfpTpDUNvZqU6CYFr8DgZs/O+ do18Lm1y4ZGp0RBgC8O0vgwAVf343kipmNvDrCG6LIlOutY15kU= =/fsI -----END PGP SIGNATURE-----