CVE-2020-10723
Published: 18 May 2020
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Priority
CVSS 3 base score: 6.7
Status
Package | Release | Status |
---|---|---|
dpdk Launchpad, Ubuntu, Debian |
Upstream |
Released
(19.11.2,18.11.8,20.02.1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(19.11.1-0ubuntu2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(19.11.1-0ubuntu1.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(17.11.9-0ubuntu18.04.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|