lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 12 Nov 2019 21:53:52 +0000
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4567-1] dpdk security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4567-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 12, 2019                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : dpdk
CVE ID         : CVE-2019-14818

It was discovered that the vhost PMD in DPDK, a set of libraries for
fast packet processing, was affected by memory and file descriptor leaks
which could result in denial of service.

For the oldstable distribution (stretch), this problem has been fixed
in version 16.11.9-1+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 18.11.2-2+deb10u2.

We recommend that you upgrade your dpdk packages.

For the detailed security status of dpdk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dpdk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=rZsl
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists