* [DPDK/other Bug 1748] Clarification on Possible Buffer Overflow Issues Reported by Fortify Tool
@ 2025-07-07 9:12 bugzilla
0 siblings, 0 replies; only message in thread
From: bugzilla @ 2025-07-07 9:12 UTC (permalink / raw)
To: dev
[-- Attachment #1: Type: text/plain, Size: 2643 bytes --]
https://bugs.dpdk.org/show_bug.cgi?id=1748
Bug ID: 1748
Summary: Clarification on Possible Buffer Overflow Issues
Reported by Fortify Tool
Product: DPDK
Version: 23.11
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: Normal
Component: other
Assignee: dev@dpdk.org
Reporter: nagendra.balagani@oracle.com
Target Milestone: ---
Hello Team,
While running Fortify static analysis on our code base that uses DPDK, we
observed some potential buffer overflow issues being reported within DPDK
library calls. At first glance, these instances appear to be false positives,
but we would like to confirm with the community and maintainers to ensure there
are no hidden risks.
Could you please help review these findings or suggest if there are any known
false positives in this area?
here are the detailed Fortify reports with exact file paths and line numbers
for your reference.
### Instance 1: rte_crypto.h Line 207
memset(op->asym, 0, sizeof(struct rte_crypto_asym_op));
Tool Description : The function __rte_crypto_op_reset() in rte_crypto.h writes
outside the bounds of asym on line 207, which could corrupt data, cause the
program to crash, or lead to the execution of malicious code.
Analysis Trace
rte_crypto.h:181 - Buffer asym Declared
rte_crypto.h:207 - memset()
Buffer Size: 0 bytes Write Length: 168 bytes
### Instance 2: rte_crypto_sym.h: 885
memset(op, 0, sizeof(*op));
Tool Description: The program writes outside the bounds of allocated memory,
which could corrupt data, crash the program, or lead to the execution of
malicious code.
Analysis Trace
rte_crypto.h:204 - Caller: __rte_crypto_op_reset
Buffer Size: 0
rte_crypto_sym.h:885 - memset()
Buffer Size: 0 bytes Write Length: 64 bytes [var 0] op.$offset: 0
### Instance3: rte_lpm.h: 347
tbl24_indexes[i] = ips[i] >> 8;
Tool Description: The function rte_lpm_lookup_bulk_func() in rte_lpm.h writes
outside the bounds of tbl24_indexes on line 347, which could corrupt data,
cause the program to crash, or lead to the execution of malicious code.
Analysis Trace
rte_lpm.h:339 - Buffer tbl24_indexes Allocated
rte_lpm.h:347 - Assignment to tbl24_indexes
Buffer Size: 262143 bytes Write Length: 1048572 bytes [var 0]
tbl24_indexes.$offset: 0 [var 1] i: 262142
Thank you in advance for your support and guidance.
Regards,
Nagendra
--
You are receiving this mail because:
You are the assignee for the bug.
[-- Attachment #2: Type: text/html, Size: 4532 bytes --]
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2025-07-07 9:13 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-07-07 9:12 [DPDK/other Bug 1748] Clarification on Possible Buffer Overflow Issues Reported by Fortify Tool bugzilla
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).