DPDK patches and discussions
 help / color / mirror / Atom feed
* [DPDK/other Bug 1748] Clarification on Possible Buffer Overflow Issues Reported by Fortify Tool
@ 2025-07-07  9:12 bugzilla
  0 siblings, 0 replies; only message in thread
From: bugzilla @ 2025-07-07  9:12 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 2643 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1748

            Bug ID: 1748
           Summary: Clarification on Possible Buffer Overflow Issues
                    Reported by Fortify Tool
           Product: DPDK
           Version: 23.11
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: normal
          Priority: Normal
         Component: other
          Assignee: dev@dpdk.org
          Reporter: nagendra.balagani@oracle.com
  Target Milestone: ---

Hello Team,

While running Fortify static analysis on our code base that uses DPDK, we
observed some potential buffer overflow issues being reported within DPDK
library calls. At first glance, these instances appear to be false positives,
but we would like to confirm with the community and maintainers to ensure there
are no hidden risks.
Could you please help review these findings or suggest if there are any known
false positives in this area?

here are the detailed Fortify reports with exact file paths and line numbers
for your reference.

### Instance 1:  rte_crypto.h Line 207
memset(op->asym, 0, sizeof(struct rte_crypto_asym_op));

Tool Description : The function __rte_crypto_op_reset() in rte_crypto.h writes
outside the bounds of asym on line 207, which could corrupt data, cause the
program to crash, or lead to the execution of malicious code.

Analysis Trace
rte_crypto.h:181 - Buffer asym Declared
rte_crypto.h:207 - memset()
Buffer Size: 0 bytes Write Length: 168 bytes


### Instance 2: rte_crypto_sym.h: 885
memset(op, 0, sizeof(*op));

Tool Description: The program writes outside the bounds of allocated memory,
which could corrupt data, crash the program, or lead to the execution of
malicious code.

Analysis Trace
rte_crypto.h:204 - Caller: __rte_crypto_op_reset
Buffer Size: 0
rte_crypto_sym.h:885 - memset()
Buffer Size: 0 bytes Write Length: 64 bytes [var 0] op.$offset: 0


### Instance3: rte_lpm.h: 347
            tbl24_indexes[i] = ips[i] >> 8;

Tool Description: The function rte_lpm_lookup_bulk_func() in rte_lpm.h writes
outside the bounds of tbl24_indexes on line 347, which could corrupt data,
cause the program to crash, or lead to the execution of malicious code.

Analysis Trace
rte_lpm.h:339 - Buffer tbl24_indexes Allocated
rte_lpm.h:347 - Assignment to tbl24_indexes
Buffer Size: 262143 bytes Write Length: 1048572 bytes [var 0]
tbl24_indexes.$offset: 0 [var 1] i: 262142


Thank you in advance for your support and guidance.

Regards,
Nagendra

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 4532 bytes --]

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2025-07-07  9:13 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-07-07  9:12 [DPDK/other Bug 1748] Clarification on Possible Buffer Overflow Issues Reported by Fortify Tool bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).