CVE-2025-39928Integer Underflow (Wrap or Wraparound) in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check for the xfer length to 'rtl9300_i2c_config_xfer' to ensure the data length isn't within the supported range. In particular a data length of 0 is not supported by the hardware and causes unintended or destructive behaviour. This limitation becomes obvious when looking at the register documentation [1]. 4 bits are reserved for DATA_WIDTH and the va

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel6.136.16.8+1
Debianlinux/linux_kernel< 6.16.8-1
CVEListV5linux/linuxc366be720235301fdadf67e6f1ea6ff32669c074c91382328fc89f73144d5582f2d8f1dd3e41c8f7+2
debiandebian/linux< linux 6.16.8-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-39928: In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check f2025-10-01
GHSA
GHSA-m43q-hvcx-4pxc: In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: ensure data length is within supported range Add an explicit check2025-10-01

📋Vendor Advisories

3
Red Hat
kernel: i2c: rtl9300: ensure data length is within supported range2025-10-01
Debian
CVE-2025-39928: linux - In the Linux kernel, the following vulnerability has been resolved: i2c: rtl930...2025
Microsoft
NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-09
CVE-2025-39928 — Integer Underflow (Wrap or Wraparound) | cvebase