A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Data Plane Development Kit Subscribe
Fedoraproject Subscribe
Opensuse Subscribe
Communications Session Border Controller Subscribe
Enterprise Communications Broker Subscribe
Enterprise Linux Subscribe
Openstack Subscribe
Rhel Extras Other Subscribe
Rhev Manager Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-4688-1 dpdk security update
EUVD EUVD EUVD-2020-3150 A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Ubuntu USN Ubuntu USN USN-4362-1 DPDK vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T11:14:14.697Z

Reserved: 2020-03-20T00:00:00

Link: CVE-2020-10723

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-19T19:15:09.837

Modified: 2024-11-21T04:55:55.973

Link: CVE-2020-10723

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-05-18T00:00:00Z

Links: CVE-2020-10723 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses