It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
https://www.debian.org/security/2018/dsa-4308
https://usn.ubuntu.com/3849-2/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3776-2/
https://usn.ubuntu.com/3776-1/
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902
https://access.redhat.com/errata/RHSA-2019:3967
https://access.redhat.com/errata/RHSA-2019:3217
https://access.redhat.com/errata/RHSA-2019:0641
https://access.redhat.com/errata/RHSA-2019:0415
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2018:3083