In the Linux kernel, the following vulnerability has been resolved: mm: swap: fix potential buffer overflow in setup_clusters() In setup_swap_map(), we only ensure badpages are in range (0, last_page]. As maxpages might be < last_page, setup_clusters() will encounter a buffer overflow when a badpage is >= maxpages. Only call inc_cluster_info_page() for badpage which is < maxpages to fix the issue.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025090728-CVE-2025-39727-b07c@gregkh/
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:19106 https://access.redhat.com/errata/RHSA-2025:19106