Description
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4688-1 | dpdk security update |
EUVD |
EUVD-2020-3150 | A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption. |
Ubuntu USN |
USN-4362-1 | DPDK vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Dpdk
Subscribe
Data Plane Development Kit
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Communications Session Border Controller
Subscribe
Enterprise Communications Broker
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Openstack
Subscribe
Rhel Extras Other
Subscribe
Rhev Manager
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:14.697Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10723
No data.
Status : Modified
Published: 2020-05-19T19:15:09.837
Modified: 2024-11-21T04:55:55.973
Link: CVE-2020-10723
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN