Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-10723

Published: 18 May 2020

A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.

Priority

Medium

Cvss 3 Severity Score

6.7

Score breakdown

Status

Package Release Status
dpdk
Launchpad, Ubuntu, Debian
bionic
Released (17.11.9-0ubuntu18.04.2)
eoan
Released (18.11.5-0ubuntu0.19.10.2)
focal
Released (19.11.1-0ubuntu1.1)
trusty Does not exist

upstream
Released (19.11.2,18.11.8,20.02.1)
xenial Not vulnerable
(code not present)

Severity score breakdown

Parameter Value
Base score 6.7
Attack vector Local
Attack complexity Low
Privileges required High
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H