In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
An attacker with physical access with a specially crafted USB device in tandem with the ability to run software on the machine may be able to create a situation where an exploit can allow for privilege escalation.
While Red Hat finds this scenario unlikely, this is the most likely case of how an attacker can use this flaw.
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1655817]