VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54009

CVE-2023-54009

Description

In the Linux kernel, the following vulnerability has been resolved:

i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path

The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error path where the function exits directly, which leads to a leak of the runtime PM reference.

Make sure that this error path also releases the runtime PM reference.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel's Cadence I2C controller driver has a runtime PM reference leak on one error path in cdns_i2c_master_xfer().

Root

Cause

The cdns_i2c_master_xfer() function in the Cadence I2C controller driver (drivers/i2c/busses/i2c-cadence.c) acquires a runtime PM reference when the function is entered. This reference is normally released when the function returns. However, there is one error path in the function that exits directly without releasing the runtime PM reference, causing a leak.

Attack

Surface and Exploitation

No special attack surface is required beyond normal use of the I2C bus. The vulnerability is triggered when an error occurs (e.g., invalid parameters or bus condition) in the I2C master transfer path. Any user or process that can initiate an I2C transfer via the Cadence controller could potentially trigger this leak. No authentication is needed beyond the capability to access the I2C device node.

Impact

If the error path is repeatedly hit, the runtime PM reference count will not be decremented, preventing the device from entering low-power states. This can lead to increased power consumption and, in extreme cases, may cause the device to remain active indefinitely, potentially degrading system performance or battery life.

Mitigation

The issue is fixed in the Linux kernel by ensuring that the error path releases the runtime PM reference, as seen in the committed patches [1][2]. Users should apply the kernel update containing these commits to resolve the vulnerability. No workaround is possible without patching the driver.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.