CVE-2023-54009
Description
In the Linux kernel, the following vulnerability has been resolved:
i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path
The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error path where the function exits directly, which leads to a leak of the runtime PM reference.
Make sure that this error path also releases the runtime PM reference.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel's Cadence I2C controller driver has a runtime PM reference leak on one error path in cdns_i2c_master_xfer().
Root
Cause
The cdns_i2c_master_xfer() function in the Cadence I2C controller driver (drivers/i2c/busses/i2c-cadence.c) acquires a runtime PM reference when the function is entered. This reference is normally released when the function returns. However, there is one error path in the function that exits directly without releasing the runtime PM reference, causing a leak.
Attack
Surface and Exploitation
No special attack surface is required beyond normal use of the I2C bus. The vulnerability is triggered when an error occurs (e.g., invalid parameters or bus condition) in the I2C master transfer path. Any user or process that can initiate an I2C transfer via the Cadence controller could potentially trigger this leak. No authentication is needed beyond the capability to access the I2C device node.
Impact
If the error path is repeatedly hit, the runtime PM reference count will not be decremented, preventing the device from entering low-power states. This can lead to increased power consumption and, in extreme cases, may cause the device to remain active indefinitely, potentially degrading system performance or battery life.
Mitigation
The issue is fixed in the Linux kernel by ensuring that the error path releases the runtime PM reference, as seen in the committed patches [1][2]. Users should apply the kernel update containing these commits to resolve the vulnerability. No workaround is possible without patching the driver.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6fd7bf900c3212d65599ad1e4a712b5a95270d0dc6553b5f25b14d7c6ba0bae1664f04f50Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/2d65599ad1e4f195bbb80752cd5cbc2f1a018dbanvd
- git.kernel.org/stable/c/5b14d7c6ba0ba5d167f5ef588ca6dfe1af6dd0aanvd
- git.kernel.org/stable/c/a712b5a95270e62209f5c2201c774f708f75234envd
- git.kernel.org/stable/c/ae1664f04f504a998737f5bb563f16b44357bccanvd
- git.kernel.org/stable/c/d0dc6553b5f2b1272c01b0eba5fe2fd89cc59f44nvd
- git.kernel.org/stable/c/fd7bf900c3215c77f6d779d1532faa22b79f2430nvd
News mentions
0No linked articles in our index yet.