[SECURITY] [DSA 5833-1] dpdk security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5833-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 17, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dpdk
CVE ID : CVE-2024-11614
A buffer overflow was discovered in the vhost code of DPDK, a set of
libraries for fast packet processing, which could result in denial of
service or the execution of arbitrary code by malicious
guests/containers.
For the stable distribution (bookworm), this problem has been fixed in
version 22.11.7-1~deb12u1.
We recommend that you upgrade your dpdk packages.
For the detailed security status of dpdk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dpdk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=/fsI
-----END PGP SIGNATURE-----
Reply to: