In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c. An attacker with physical access with a specially crafted USB device in tandem with the ability to run software on the machine may be able to create a situation where an exploit can allow for privilege escalation. While Red Hat finds this scenario unlikely, this is the most likely case of how an attacker can use this flaw. External Reference: https://www.openwall.com/lists/oss-security/2018/12/03/1 Reference: https://bugzilla.suse.com/show_bug.cgi?id=1118152 Upstream Patches: https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1655817]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:2703 https://access.redhat.com/errata/RHSA-2019:2703
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-19824