CVE-2020-36780: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: i2c: sprd: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in sprd_i2c_master_xfer() and sprd_i2c_remove(). However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI Analysis
Technical Summary
CVE-2020-36780 is a medium-severity vulnerability identified in the Linux kernel's I2C subsystem, specifically within the Spreadtrum (sprd) driver implementation. The issue arises from improper handling of the power management (PM) runtime reference count in the functions sprd_i2c_master_xfer() and sprd_i2c_remove(). The vulnerability is due to the use of pm_runtime_get_sync(), which increments the PM reference count even when it fails, but the code does not properly decrement or balance this increment in failure scenarios. This leads to a reference leak, where the PM usage counter becomes unbalanced. Over time, this can cause the device to remain in an undesired power state, potentially leading to resource exhaustion or denial of service (DoS) conditions. The fix replaces pm_runtime_get_sync() with pm_runtime_resume_and_get(), which correctly manages the usage counter to prevent leaks. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing system instability or crashes due to improper power management. Exploitation requires local access with low privileges and high attack complexity, with no user interaction needed. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running Linux kernels with the affected Spreadtrum I2C driver, which may be embedded in specialized hardware or IoT devices. The impact is mainly on system availability, as the reference leak can cause power management issues leading to device instability or crashes. This can disrupt critical infrastructure or industrial control systems that rely on embedded Linux devices, especially in sectors like manufacturing, telecommunications, and transportation. While the vulnerability does not expose sensitive data or allow privilege escalation, the resulting denial of service could interrupt business operations or degrade service reliability. Organizations using Linux-based embedded systems with Spreadtrum chipsets should be particularly vigilant. The medium severity rating reflects the limited scope and complexity of exploitation but acknowledges the potential for operational disruption.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions deployed on their devices are updated to include the patch replacing pm_runtime_get_sync() with pm_runtime_resume_and_get() in the Spreadtrum I2C driver. Since this is a kernel-level fix, applying vendor-supplied kernel updates or recompiling the kernel with the patched driver is essential. For embedded systems where kernel updates are challenging, organizations should work with hardware vendors to obtain patched firmware or kernel images. Additionally, monitoring device logs for power management anomalies and unexpected device resets can help detect exploitation attempts. Implementing strict access controls to limit local user access to trusted personnel reduces the risk of exploitation. Finally, organizations should maintain an inventory of devices using Spreadtrum chipsets to prioritize patching and risk assessment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2020-36780: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: i2c: sprd: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in sprd_i2c_master_xfer() and sprd_i2c_remove(). However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI-Powered Analysis
Technical Analysis
CVE-2020-36780 is a medium-severity vulnerability identified in the Linux kernel's I2C subsystem, specifically within the Spreadtrum (sprd) driver implementation. The issue arises from improper handling of the power management (PM) runtime reference count in the functions sprd_i2c_master_xfer() and sprd_i2c_remove(). The vulnerability is due to the use of pm_runtime_get_sync(), which increments the PM reference count even when it fails, but the code does not properly decrement or balance this increment in failure scenarios. This leads to a reference leak, where the PM usage counter becomes unbalanced. Over time, this can cause the device to remain in an undesired power state, potentially leading to resource exhaustion or denial of service (DoS) conditions. The fix replaces pm_runtime_get_sync() with pm_runtime_resume_and_get(), which correctly manages the usage counter to prevent leaks. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing system instability or crashes due to improper power management. Exploitation requires local access with low privileges and high attack complexity, with no user interaction needed. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running Linux kernels with the affected Spreadtrum I2C driver, which may be embedded in specialized hardware or IoT devices. The impact is mainly on system availability, as the reference leak can cause power management issues leading to device instability or crashes. This can disrupt critical infrastructure or industrial control systems that rely on embedded Linux devices, especially in sectors like manufacturing, telecommunications, and transportation. While the vulnerability does not expose sensitive data or allow privilege escalation, the resulting denial of service could interrupt business operations or degrade service reliability. Organizations using Linux-based embedded systems with Spreadtrum chipsets should be particularly vigilant. The medium severity rating reflects the limited scope and complexity of exploitation but acknowledges the potential for operational disruption.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions deployed on their devices are updated to include the patch replacing pm_runtime_get_sync() with pm_runtime_resume_and_get() in the Spreadtrum I2C driver. Since this is a kernel-level fix, applying vendor-supplied kernel updates or recompiling the kernel with the patched driver is essential. For embedded systems where kernel updates are challenging, organizations should work with hardware vendors to obtain patched firmware or kernel images. Additionally, monitoring device logs for power management anomalies and unexpected device resets can help detect exploitation attempts. Implementing strict access controls to limit local user access to trusted personnel reduces the risk of exploitation. Finally, organizations should maintain an inventory of devices using Spreadtrum chipsets to prioritize patching and risk assessment.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-26T17:07:27.434Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea5cd
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 10:21:40 AM
Last updated: 1/19/2026, 12:23:50 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumCVE-2025-15539: Denial of Service in Open5GS
MediumCVE-2026-23733: CWE-94: Improper Control of Generation of Code ('Code Injection') in lobehub lobe-chat
MediumCVE-2025-15538: Use After Free in Open Asset Import Library Assimp
MediumCVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.