In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer The PCM stream data in USB-audio driver is transferred over USB URB packet buffers, and each packet size is determined dynamically. The packet sizes are limited by some factors such as wMaxPacketSize USB descriptor. OTOH, in the current code, the actually used packet sizes are determined only by the rate and the PPS, which may be bigger than the size limit above. This results in a buffer overflow, as reported by syzbot. Basically when the limit is smaller than the calculated packet size, it implies that something is wrong, most likely a weird USB descriptor. So the best option would be just to return an error at the parameter setup time before doing any further operations. This patch introduces such a sanity check, and returns -EINVAL when the packet size is greater than maxpacksize. The comparison with ep->packsize[1] alone should suffice since it's always equal or greater than ep->packsize[0].
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025120716-CVE-2025-40269-9769@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2212 https://access.redhat.com/errata/RHSA-2026:2212
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2264 https://access.redhat.com/errata/RHSA-2026:2264
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2378 https://access.redhat.com/errata/RHSA-2026:2378
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:2721 https://access.redhat.com/errata/RHSA-2026:2721
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:2759 https://access.redhat.com/errata/RHSA-2026:2759
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:2761 https://access.redhat.com/errata/RHSA-2026:2761
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:2766 https://access.redhat.com/errata/RHSA-2026:2766
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:3267 https://access.redhat.com/errata/RHSA-2026:3267
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:3293 https://access.redhat.com/errata/RHSA-2026:3293
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:3358 https://access.redhat.com/errata/RHSA-2026:3358
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:3375 https://access.redhat.com/errata/RHSA-2026:3375
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:4242 https://access.redhat.com/errata/RHSA-2026:4242
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2026:4243 https://access.redhat.com/errata/RHSA-2026:4243