Description
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Published: 2020-05-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4688-1 dpdk security update
EUVD EUVD EUVD-2020-3150 A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Ubuntu USN Ubuntu USN USN-4362-1 DPDK vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Dpdk Data Plane Development Kit
Fedoraproject Fedora
Opensuse Leap
Oracle Communications Session Border Controller Enterprise Communications Broker
Redhat Enterprise Linux Openstack Rhel Extras Other Rhev Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T11:14:14.697Z

Reserved: 2020-03-20T00:00:00.000Z

Link: CVE-2020-10723

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-19T19:15:09.837

Modified: 2024-11-21T04:55:55.973

Link: CVE-2020-10723

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-18T00:00:00Z

Links: CVE-2020-10723 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses