Name | CVE-2020-10723 |
Description | A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 960936 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
dpdk (PTS) | bullseye | 20.11.10-1~deb11u1 | fixed |
bullseye (security) | 20.11.6-1~deb11u1 | fixed | |
bookworm, bookworm (security) | 22.11.7-1~deb12u1 | fixed | |
sid, trixie | 24.11.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
dpdk | source | stretch | (not affected) | |||
dpdk | source | buster | 18.11.6-1~deb10u2 | |||
dpdk | source | (unstable) | 19.11.2-1 | 960936 |
[stretch] - dpdk <not-affected> (Vulnerable code not present)