kernel is vulnerable to denial of service (DoS). The vulnerability exists through a memory leak in register_queue_kobjects() in net/core/net-sysfs.c.
lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2020:0740
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1656432
bugzilla.redhat.com/show_bug.cgi?id=1694143
bugzilla.redhat.com/show_bug.cgi?id=1712197
bugzilla.redhat.com/show_bug.cgi?id=1719067
bugzilla.redhat.com/show_bug.cgi?id=1721034
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab
security.netapp.com/advisory/ntap-20191004-0001/
support.f5.com/csp/article/K57418558?utm_source=f5support&utm_medium=RSS