CVE-2020-10723

CWE-190Integer Overflow13 documents10 sources
Severity
6.7MEDIUM
EPSS
0.1%
top 66.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateMay 24

Description

A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:HExploitability: 0.8 | Impact: 4.2

Affected Packages7 packages

Debiandpdk< 19.11.2-1+3
Ubuntudpdk< 17.11.9-0ubuntu18.04.2+1
CVEListV5[unknown]/dpdk18.11.8, 19.11.2, 20.02.1+2

Also affects: Fedora 32, Ubuntu Linux 18.04, 19.10, 20.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-4gq2-9rxc-45pg: A memory corruption issue was found in DPDK versions 172022-05-24
CVEList
CVE-2020-10723: A memory corruption issue was found in DPDK versions 172020-05-19
OSV
CVE-2020-10723: A memory corruption issue was found in DPDK versions 172020-05-19
OSV
dpdk vulnerabilities2020-05-18

📋Vendor Advisories

5
Oracle
Oracle Oracle Communications Risk Matrix: System (DPDK) — CVE-2020-107232021-01-15
Red Hat
dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()2020-05-18
Ubuntu
DPDK vulnerabilities2020-05-18
Microsoft
A memory corruption issue was found in DPDK versions 17.05 and above2020-05-12
Debian
CVE-2020-10723: dpdk - A memory corruption issue was found in DPDK versions 17.05 and above. This flaw ...2020

💬Community

3
Bugzilla
Update to dpdk-19.11.32020-09-01
Bugzilla
CVE-2020-10723 dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() [fedora-all]2020-05-18
Bugzilla
CVE-2020-10723 dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()2020-04-28