kernel is vulnerable to arbitrary code execution. The vulnerability exists through a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
access.redhat.com/errata/RHSA-2020:2427
access.redhat.com/security/updates/classification/#important
access.redhat.com/solutions/5142691
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f95fa5c955d0a9987ffdc3a095e2f4e62c5f2a9
github.com/torvalds/linux/commit/2f95fa5c955d0a9987ffdc3a095e2f4e62c5f2a9
patchwork.kernel.org/patch/11447049/
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4363-1/
usn.ubuntu.com/4367-1/
usn.ubuntu.com/4368-1/
usn.ubuntu.com/4369-1/