๐Ÿ” CVE Alert

CVE-2025-38671

UNKNOWN 0.0

i2c: qup: jump out of the loop in case of timeout

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 22, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
fbfab1ab065879370541caf0e514987368eb41b2 < cbec4406998185e0311ae97dfacc649f9cd79b0b fbfab1ab065879370541caf0e514987368eb41b2 < acfa2948be630ad857535cb36153697f3cbf9ca9 fbfab1ab065879370541caf0e514987368eb41b2 < d05ec13aa3eb868a60dc961b489053a643863ddc fbfab1ab065879370541caf0e514987368eb41b2 < c523bfba46c4b4d7676fb050909533a766698ecd fbfab1ab065879370541caf0e514987368eb41b2 < 0d33913fce67a93c1eb83396c3c9d6b411dcab33 fbfab1ab065879370541caf0e514987368eb41b2 < 42c4471b30fa203249f476dd42321cd7efb7f6a8 fbfab1ab065879370541caf0e514987368eb41b2 < 89459f168b78e5c801dc8b7ad037b62898bc4f57 fbfab1ab065879370541caf0e514987368eb41b2 < a7982a14b3012527a9583d12525cd0dc9f8d8934
Linux / Linux
4.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b git.kernel.org: https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9 git.kernel.org: https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc git.kernel.org: https://git.kernel.org/stable/c/c523bfba46c4b4d7676fb050909533a766698ecd git.kernel.org: https://git.kernel.org/stable/c/0d33913fce67a93c1eb83396c3c9d6b411dcab33 git.kernel.org: https://git.kernel.org/stable/c/42c4471b30fa203249f476dd42321cd7efb7f6a8 git.kernel.org: https://git.kernel.org/stable/c/89459f168b78e5c801dc8b7ad037b62898bc4f57 git.kernel.org: https://git.kernel.org/stable/c/a7982a14b3012527a9583d12525cd0dc9f8d8934 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html