exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4567-1

Debian Security Advisory 4567-1
Posted Nov 13, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4567-1 - It was discovered that the vhost PMD in DPDK, a set of libraries for fast packet processing, was affected by memory and file descriptor leaks which could result in denial of service.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2019-14818
SHA-256 | bddd49b7817f1c4c15edd86d502a2dea39a1f9ee460b62d25ba7a5337c824b14

Debian Security Advisory 4567-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4567-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 12, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : dpdk
CVE ID : CVE-2019-14818

It was discovered that the vhost PMD in DPDK, a set of libraries for
fast packet processing, was affected by memory and file descriptor leaks
which could result in denial of service.

For the oldstable distribution (stretch), this problem has been fixed
in version 16.11.9-1+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 18.11.2-2+deb10u2.

We recommend that you upgrade your dpdk packages.

For the detailed security status of dpdk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/dpdk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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rZsl
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close