A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html
bugs.dpdk.org/show_bug.cgi?id=268
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/
usn.ubuntu.com/4362-1/
www.openwall.com/lists/oss-security/2020/05/18/2
www.oracle.com/security-alerts/cpujan2021.html
www.oracle.com/security-alerts/cpuoct2020.html