CVE-2023-54175
Unknown Unknown - Not Provided
Runtime PM Reference Leak in Linux Kernel i2c xiic_xfer() Function

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path The xiic_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error path where the function exits directly, which leads to a leak of the runtime PM reference. Make sure that this error path also releases the runtime PM reference.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a runtime power management (PM) reference leak in the Linux kernel's i2c xiic driver. Specifically, the xiic_xfer() function acquires a runtime PM reference when it starts and is supposed to release it when it finishes. However, there is an error path in the function where it exits early without releasing this reference, causing a leak. The fix ensures that the runtime PM reference is properly released even on error paths.


What immediate steps should I take to mitigate this vulnerability?

Apply the patch or update to the Linux kernel version that includes the fix for the xiic_xfer() runtime PM leak in the i2c xiic driver. This ensures that the runtime PM reference is properly released on all error paths, preventing the resource leak.


How can this vulnerability impact me? :

The impact of this vulnerability is a resource leak related to runtime power management references. This could potentially lead to increased power consumption or improper power state management in devices using the affected driver, possibly affecting system stability or battery life. However, no direct security impact or exploitation details are provided.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart