-

CVE-2025-38671

In the Linux kernel, the following vulnerability has been resolved:

i2c: qup: jump out of the loop in case of timeout

Original logic only sets the return value but doesn't jump out of the
loop if the bus is kept active by a client. This is not expected. A
malicious or buggy i2c client can hang the kernel in this case and
should be avoided. This is observed during a long time test with a
PCA953x GPIO extender.

Fix it by changing the logic to not only sets the return value, but also
jumps out of the loop and return to the caller with -ETIMEDOUT.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < cbec4406998185e0311ae97dfacc649f9cd79b0b
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < acfa2948be630ad857535cb36153697f3cbf9ca9
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < d05ec13aa3eb868a60dc961b489053a643863ddc
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < c523bfba46c4b4d7676fb050909533a766698ecd
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < 0d33913fce67a93c1eb83396c3c9d6b411dcab33
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < 42c4471b30fa203249f476dd42321cd7efb7f6a8
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < 89459f168b78e5c801dc8b7ad037b62898bc4f57
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
Version < a7982a14b3012527a9583d12525cd0dc9f8d8934
Version fbfab1ab065879370541caf0e514987368eb41b2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.17
Status affected
Version < 4.17
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.101
Status unaffected
Version <= 6.12.*
Version 6.12.41
Status unaffected
Version <= 6.15.*
Version 6.15.9
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.089
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String