A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-4688-1 | dpdk security update |
![]() |
EUVD-2020-3150 | A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption. |
![]() |
USN-4362-1 | DPDK vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.697Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10723

No data.

Status : Modified
Published: 2020-05-19T19:15:09.837
Modified: 2024-11-21T04:55:55.973
Link: CVE-2020-10723


No data.