-
CVE-2025-38671
- EPSS 0.04%
- Veröffentlicht 22.08.2025 16:03:02
- Zuletzt bearbeitet 28.08.2025 15:15:58
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
cbec4406998185e0311ae97dfacc649f9cd79b0b
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
acfa2948be630ad857535cb36153697f3cbf9ca9
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
d05ec13aa3eb868a60dc961b489053a643863ddc
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
c523bfba46c4b4d7676fb050909533a766698ecd
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
0d33913fce67a93c1eb83396c3c9d6b411dcab33
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
42c4471b30fa203249f476dd42321cd7efb7f6a8
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
89459f168b78e5c801dc8b7ad037b62898bc4f57
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
Version <
a7982a14b3012527a9583d12525cd0dc9f8d8934
Version
fbfab1ab065879370541caf0e514987368eb41b2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.17
Status
affected
Version <
4.17
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.101
Status
unaffected
Version <=
6.12.*
Version
6.12.41
Status
unaffected
Version <=
6.15.*
Version
6.15.9
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.089 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|