-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5222-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff August 30, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : dpdk CVE ID : CVE-2022-2132 CVE-2022-28199 A buffer overflow was discovered in the vhost code of DPDK, a set of libraries for fast packet processing, which could result in denial of service or the execution of arbitrary code by malicious guests/containers. For the stable distribution (bullseye), these problems have been fixed in version 20.11.6-1~deb11u1. We recommend that you upgrade your dpdk packages. For the detailed security status of dpdk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dpdk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected]