CVE-2025-39928
Severity CVSS v4.0:
Pending analysis
Type:
CWE-191
Integer Underflow (Wrap or Wraparound)
Publication date:
01/10/2025
Last modified:
14/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
i2c: rtl9300: ensure data length is within supported range<br />
<br />
Add an explicit check for the xfer length to &#39;rtl9300_i2c_config_xfer&#39;<br />
to ensure the data length isn&#39;t within the supported range. In<br />
particular a data length of 0 is not supported by the hardware and<br />
causes unintended or destructive behaviour.<br />
<br />
This limitation becomes obvious when looking at the register<br />
documentation [1]. 4 bits are reserved for DATA_WIDTH and the value<br />
of these 4 bits is used as N + 1, allowing a data length range of<br />
1
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



