kernel is vulnerable to arbitrary code execution. The vulnerability exists through a use-after-free in the sound subsystem as card disconnection causes certain data structures to be deleted too early.
lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
www.openwall.com/lists/oss-security/2019/08/20/2
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1743591
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7
security.netapp.com/advisory/ntap-20190905-0002/
syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9
usn.ubuntu.com/4115-1/
usn.ubuntu.com/4118-1/