kernel is vulnerable to arbitrary code execution. An out-of-bounds memory access via mmio ring buffer allows an attacker to escalate privilege or crash the system.
lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
www.openwall.com/lists/oss-security/2019/09/20/1
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2019:3978
access.redhat.com/errata/RHSA-2019:3979
access.redhat.com/errata/RHSA-2019:4154
access.redhat.com/errata/RHSA-2019:4256
access.redhat.com/errata/RHSA-2020:0027
access.redhat.com/errata/RHSA-2020:0204
access.redhat.com/errata/RHSA-2020:2851
access.redhat.com/security/cve/CVE-2019-14821
access.redhat.com/security/updates/classification/#important
access.redhat.com/solutions/5142691
bugzilla.redhat.com/show_bug.cgi?id=1746708
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
lists.debian.org/debian-lts-announce/2019/10/msg00000.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
lists.fedoraproject.org/archives/list/[email protected]/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/
lists.fedoraproject.org/archives/list/[email protected]/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
seclists.org/bugtraq/2019/Nov/11
seclists.org/bugtraq/2019/Sep/41
security.netapp.com/advisory/ntap-20191004-0001/
usn.ubuntu.com/4157-1/
usn.ubuntu.com/4157-2/
usn.ubuntu.com/4162-1/
usn.ubuntu.com/4162-2/
usn.ubuntu.com/4163-1/
usn.ubuntu.com/4163-2/
www.debian.org/security/2019/dsa-4531
www.oracle.com/security-alerts/cpuapr2020.html