In the Linux kernel, the following vulnerability has been resolved: e1000e: fix heap overflow in e1000_set_eeprom Fix a possible heap overflow in e1000_set_eeprom function by adding input validation for the requested length of the change in the EEPROM. In addition, change the variable type from int to size_t for better code practices and rearrange declarations to RCT.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025100116-CVE-2025-39898-d844@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2025:21933 https://access.redhat.com/errata/RHSA-2025:21933
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:22387 https://access.redhat.com/errata/RHSA-2025:22387
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:22388 https://access.redhat.com/errata/RHSA-2025:22388
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:22395 https://access.redhat.com/errata/RHSA-2025:22395
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:22405 https://access.redhat.com/errata/RHSA-2025:22405
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2025:22571 https://access.redhat.com/errata/RHSA-2025:22571