kernel is vulnerable to denial of service. An attacker is able to cause a sync to take an excessive amount of time to complete via a malicious XFS v5 image.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
access.redhat.com/errata/RHSA-2020:4609
access.redhat.com/security/updates/classification/#moderate
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62
github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
lists.debian.org/debian-lts-announce/2020/08/msg00019.html
lists.debian.org/debian-lts-announce/2020/10/msg00032.html
lists.debian.org/debian-lts-announce/2020/10/msg00034.html
lists.fedoraproject.org/archives/list/[email protected]/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
lists.fedoraproject.org/archives/list/[email protected]/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
lists.fedoraproject.org/archives/list/[email protected]/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/
lore.kernel.org/linux-xfs/20200221153803.GP9506@magnolia/
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4465-1/
usn.ubuntu.com/4483-1/
usn.ubuntu.com/4485-1/