CVE-2019-20810

go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 Release Notes Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4427-1/ Third Party Advisory
https://usn.ubuntu.com/4439-1/ Third Party Advisory
https://usn.ubuntu.com/4440-1/ Third Party Advisory
https://usn.ubuntu.com/4483-1/ Third Party Advisory
https://usn.ubuntu.com/4485-1/ Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 Release Notes Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4427-1/ Third Party Advisory
https://usn.ubuntu.com/4439-1/ Third Party Advisory
https://usn.ubuntu.com/4440-1/ Third Party Advisory
https://usn.ubuntu.com/4483-1/ Third Party Advisory
https://usn.ubuntu.com/4485-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

No history.

Information

Published : 2020-06-03 00:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-20810

Mitre link : CVE-2019-20810

CVE.ORG link : CVE-2019-20810


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel

opensuse

  • leap
CWE
CWE-401

Missing Release of Memory after Effective Lifetime