CVE-2025-38671

In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 22:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0d33913fce67a93c1eb83396c3c9d6b411dcab33 - () https://git.kernel.org/stable/c/0d33913fce67a93c1eb83396c3c9d6b411dcab33 - Patch
References () https://git.kernel.org/stable/c/42c4471b30fa203249f476dd42321cd7efb7f6a8 - () https://git.kernel.org/stable/c/42c4471b30fa203249f476dd42321cd7efb7f6a8 - Patch
References () https://git.kernel.org/stable/c/89459f168b78e5c801dc8b7ad037b62898bc4f57 - () https://git.kernel.org/stable/c/89459f168b78e5c801dc8b7ad037b62898bc4f57 - Patch
References () https://git.kernel.org/stable/c/a7982a14b3012527a9583d12525cd0dc9f8d8934 - () https://git.kernel.org/stable/c/a7982a14b3012527a9583d12525cd0dc9f8d8934 - Patch
References () https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9 - () https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9 - Patch
References () https://git.kernel.org/stable/c/c523bfba46c4b4d7676fb050909533a766698ecd - () https://git.kernel.org/stable/c/c523bfba46c4b4d7676fb050909533a766698ecd - Patch
References () https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b - () https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b - Patch
References () https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc - () https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9 -
  • () https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b -
  • () https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i2c: qup: se sale del bucle en caso de tiempo de espera. La lógica original solo establece el valor de retorno, pero no se sale del bucle si un cliente mantiene activo el bus. Esto es inesperado. Un cliente i2c malicioso o con errores puede bloquear el kernel en este caso, por lo que debe evitarse. Esto se observó durante una prueba prolongada con un extensor GPIO PCA953x. Para solucionarlo, cambie la lógica para que no solo establezca el valor de retorno, sino que también se salga del bucle y regrese al llamador con -ETIMEDOUT.

22 Aug 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 16:15

Updated : 2026-01-08 22:30


NVD link : CVE-2025-38671

Mitre link : CVE-2025-38671

CVE.ORG link : CVE-2025-38671


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel