CVE-2019-20810

go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 Release Notes Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4427-1/ Third Party Advisory
https://usn.ubuntu.com/4439-1/ Third Party Advisory
https://usn.ubuntu.com/4440-1/ Third Party Advisory
https://usn.ubuntu.com/4483-1/ Third Party Advisory
https://usn.ubuntu.com/4485-1/ Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html Mailing List Third Party Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 Release Notes Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html Mailing List Third Party Advisory
https://usn.ubuntu.com/4427-1/ Third Party Advisory
https://usn.ubuntu.com/4439-1/ Third Party Advisory
https://usn.ubuntu.com/4440-1/ Third Party Advisory
https://usn.ubuntu.com/4483-1/ Third Party Advisory
https://usn.ubuntu.com/4485-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:39

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html - Mailing List, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 - Release Notes, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6 - Release Notes, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/4427-1/ - Third Party Advisory () https://usn.ubuntu.com/4427-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4439-1/ - Third Party Advisory () https://usn.ubuntu.com/4439-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4440-1/ - Third Party Advisory () https://usn.ubuntu.com/4440-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4483-1/ - Third Party Advisory () https://usn.ubuntu.com/4483-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4485-1/ - Third Party Advisory () https://usn.ubuntu.com/4485-1/ - Third Party Advisory

Information

Published : 2020-06-03 00:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-20810

Mitre link : CVE-2019-20810

CVE.ORG link : CVE-2019-20810


JSON object : View

Products Affected

opensuse

  • leap

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-401

Missing Release of Memory after Effective Lifetime