A vulnerability was found in F2FS touch driver in kernel where there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation. Upstream patch: https://lore.kernel.org/patchwork/patch/1060480/ References: https://source.android.com/security/bulletin/pixel/2019-09-01
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1819149]
This was fixed for Fedora with the 5.1.12 stable kernel updates.
For F2FS (file system) that is disabled for all rhel* versions, the configuration param that is disabled: "# CONFIG_F2FS_FS is not set"