In the Linux kernel, the following vulnerability has been resolved:
i2c: qup: jump out of the loop in case of timeout
Original logic only sets the return value but doesn't jump out of the
loop if the bus is kept active by a client. This is not expected. A
malicious or buggy i2c client can hang the kernel in this case and
should be avoided. This is observed during a long time test with a
PCA953x GPIO extender.
Fix it by changing the logic to not only sets the return value, but also
jumps out of the loop and return to the caller with -ETIMEDOUT.
Metrics
Affected Vendors & Products
References
History
Thu, 28 Aug 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 25 Aug 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 23 Aug 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Fri, 22 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT. | |
Title | i2c: qup: jump out of the loop in case of timeout | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-08-22T16:03:02.151Z
Updated: 2025-08-28T14:44:37.404Z
Reserved: 2025-04-16T04:51:24.031Z
Link: CVE-2025-38671

No data.

Status : Awaiting Analysis
Published: 2025-08-22T16:15:42.683
Modified: 2025-08-28T15:15:58.300
Link: CVE-2025-38671
