CVE-2023-54175
Description
In the Linux kernel, the following vulnerability has been resolved:
i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path
The xiic_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error path where the function exits directly, which leads to a leak of the runtime PM reference.
Make sure that this error path also releases the runtime PM reference.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The xiic_xfer() function in the Linux kernel's I2C XIIC driver leaks a runtime PM reference on one error path, requiring a fix to properly release the reference.
Vulnerability
Overview
In the Linux kernel, the I2C XIIC driver's xiic_xfer() function acquires a runtime power management (PM) reference upon entry. The reference is normally released when the function exits. However, one specific error path in xiic_xfer() returns directly without releasing the PM reference, causing a resource leak [1].
Exploitation and
Impact
This vulnerability affects systems using the I2C XIIC driver, typically embedded platforms where runtime PM is used to manage power consumption. An attacker could potentially trigger this error path repeatedly, leading to exhaustion of runtime PM references. Over time, this could prevent the device from entering low-power states or cause instability, though the impact is primarily resource depletion rather than code execution [2].
Mitigation
The fix ensures that all error paths in xiic_xfer() properly release the runtime PM reference. The patch has been applied to the Linux kernel stable tree and is available in multiple stable versions [3]. Users should update to a patched kernel version to avoid the leak.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
62d320d9de7d372cb227a368c06e661a259976027d84c073e688fdfc458bfd663d93bb47eVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/06e661a259978305c0015f6f33d14477a0cfbe8fnvd
- git.kernel.org/stable/c/2d320d9de7d31c0eb279b3f8a02cf1af473a3737nvd
- git.kernel.org/stable/c/6027d84c073e26cb1b32a90d69c5fbad57776406nvd
- git.kernel.org/stable/c/688fdfc458bfa651dca39c736d39c1b7520af0e8nvd
- git.kernel.org/stable/c/72cb227a368cf286efb8ce1e741e8c7085747b4dnvd
- git.kernel.org/stable/c/d663d93bb47e7ab45602b227701022d8aa16040anvd
News mentions
0No linked articles in our index yet.