CVE-2020-10723

Priority
Description
A memory corruption issue was found in DPDK versions 17.05 and above. This
flaw is caused by an integer truncation on the index of a payload. Under
certain circumstances, the index (a UInt) is copied and truncated into a
uint16, which can lead to out of bound indexing and possible memory
corruption.
Assigned-to
mdeslaur
Notes
Package
Source: dpdk (LP Ubuntu Debian)
Upstream:released (19.11.2,18.11.8,20.02.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (17.11.9-0ubuntu18.04.2)
Ubuntu 19.10 (Eoan Ermine):released (18.11.5-0ubuntu0.19.10.2)
Ubuntu 20.04 LTS (Focal Fossa):released (19.11.1-0ubuntu1.1)
Ubuntu 20.10 (Groovy Gorilla):released (19.11.1-0ubuntu2)
More Information

Updated: 2020-05-29 19:21:48 UTC (commit 2d0d387aa141e969cc1ddbb230ab2faa3ee568d5)