Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: Fix out-of-bounds bug in rtl9300_i2c_smbus_xfer The data->block[0] variable comes from user. Without proper check, the variable may be very large to cause an out-of-bounds bug. Fix this bug by checking the value of data->block[0] first. 1. commit 39244cc75482 ("i2c: ismt: Fix an out-of-bounds bug in ismt_access()") 2. commit 92fbb6d1296f ("i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer()")
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.13, < 6.16.4 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/071e43fcba5ddd9a7813e6cc0aa10299eae41b21Patch
- https://git.kernel.org/stable/c/57f312b955938fc4663f430cb57a71f2414f601bPatch
FAQ
What is CVE-2025-39680?
CVE-2025-39680 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: i2c: rtl9300: Fix out-of-bounds bug in rtl9300_i2c_smbus_xfer The data->block[0] variable comes from user. Without proper check, t...
How severe is CVE-2025-39680?
CVE-2025-39680 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-39680?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.