Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.debian.org/security/2018/dsa-4187
https://usn.ubuntu.com/3632-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3583-1/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://security-tracker.debian.org/tracker/CVE-2017-0861
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:2390
http://www.securityfocus.com/bid/102329
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html