5.5
MEDIUM CVSS 3.1
CVE-2025-38671
i2c: qup: jump out of the loop in case of timeout
Description

In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT.

INFO

Published Date :

Aug. 22, 2025, 4:15 p.m.

Last Modified :

Jan. 8, 2026, 10:30 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-38671 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
1 Debian debian_linux
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Update Linux kernel to fix i2c bus timeout loop, preventing hangs.
  • Update the Linux kernel to a version containing the fix.
  • Apply the specific patch that addresses the i2c: qup timeout issue.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-38671 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-38671 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-38671 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-38671 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 08, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.148 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.101 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.41 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.190 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.241 *cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.16:rc7:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.15.9 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.17 up to (excluding) 5.4.297
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/0d33913fce67a93c1eb83396c3c9d6b411dcab33 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/42c4471b30fa203249f476dd42321cd7efb7f6a8 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/89459f168b78e5c801dc8b7ad037b62898bc4f57 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a7982a14b3012527a9583d12525cd0dc9f8d8934 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/c523bfba46c4b4d7676fb050909533a766698ecd Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc Types: Patch
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html Types: Third Party Advisory
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html Types: Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 03, 2025

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
    Added Reference https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Aug. 28, 2025

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/acfa2948be630ad857535cb36153697f3cbf9ca9
    Added Reference https://git.kernel.org/stable/c/cbec4406998185e0311ae97dfacc649f9cd79b0b
    Added Reference https://git.kernel.org/stable/c/d05ec13aa3eb868a60dc961b489053a643863ddc
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Aug. 22, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: i2c: qup: jump out of the loop in case of timeout Original logic only sets the return value but doesn't jump out of the loop if the bus is kept active by a client. This is not expected. A malicious or buggy i2c client can hang the kernel in this case and should be avoided. This is observed during a long time test with a PCA953x GPIO extender. Fix it by changing the logic to not only sets the return value, but also jumps out of the loop and return to the caller with -ETIMEDOUT.
    Added Reference https://git.kernel.org/stable/c/0d33913fce67a93c1eb83396c3c9d6b411dcab33
    Added Reference https://git.kernel.org/stable/c/42c4471b30fa203249f476dd42321cd7efb7f6a8
    Added Reference https://git.kernel.org/stable/c/89459f168b78e5c801dc8b7ad037b62898bc4f57
    Added Reference https://git.kernel.org/stable/c/a7982a14b3012527a9583d12525cd0dc9f8d8934
    Added Reference https://git.kernel.org/stable/c/c523bfba46c4b4d7676fb050909533a766698ecd
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact