CVE-2020-36780: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: i2c: sprd: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in sprd_i2c_master_xfer() and sprd_i2c_remove(). However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI Analysis
Technical Summary
CVE-2020-36780 is a medium-severity vulnerability identified in the Linux kernel's I2C subsystem, specifically within the Spreadtrum (sprd) driver implementation. The issue arises from improper handling of the power management (PM) runtime reference count in the functions sprd_i2c_master_xfer() and sprd_i2c_remove(). The vulnerability is due to the use of pm_runtime_get_sync(), which increments the PM reference count even when it fails, but the code does not properly decrement or balance this increment in failure scenarios. This leads to a reference leak, where the PM usage counter becomes unbalanced. Over time, this can cause the device to remain in an undesired power state, potentially leading to resource exhaustion or denial of service (DoS) conditions. The fix replaces pm_runtime_get_sync() with pm_runtime_resume_and_get(), which correctly manages the usage counter to prevent leaks. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing system instability or crashes due to improper power management. Exploitation requires local access with low privileges and high attack complexity, with no user interaction needed. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running Linux kernels with the affected Spreadtrum I2C driver, which may be embedded in specialized hardware or IoT devices. The impact is mainly on system availability, as the reference leak can cause power management issues leading to device instability or crashes. This can disrupt critical infrastructure or industrial control systems that rely on embedded Linux devices, especially in sectors like manufacturing, telecommunications, and transportation. While the vulnerability does not expose sensitive data or allow privilege escalation, the resulting denial of service could interrupt business operations or degrade service reliability. Organizations using Linux-based embedded systems with Spreadtrum chipsets should be particularly vigilant. The medium severity rating reflects the limited scope and complexity of exploitation but acknowledges the potential for operational disruption.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions deployed on their devices are updated to include the patch replacing pm_runtime_get_sync() with pm_runtime_resume_and_get() in the Spreadtrum I2C driver. Since this is a kernel-level fix, applying vendor-supplied kernel updates or recompiling the kernel with the patched driver is essential. For embedded systems where kernel updates are challenging, organizations should work with hardware vendors to obtain patched firmware or kernel images. Additionally, monitoring device logs for power management anomalies and unexpected device resets can help detect exploitation attempts. Implementing strict access controls to limit local user access to trusted personnel reduces the risk of exploitation. Finally, organizations should maintain an inventory of devices using Spreadtrum chipsets to prioritize patching and risk assessment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2020-36780: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: i2c: sprd: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in sprd_i2c_master_xfer() and sprd_i2c_remove(). However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI-Powered Analysis
Technical Analysis
CVE-2020-36780 is a medium-severity vulnerability identified in the Linux kernel's I2C subsystem, specifically within the Spreadtrum (sprd) driver implementation. The issue arises from improper handling of the power management (PM) runtime reference count in the functions sprd_i2c_master_xfer() and sprd_i2c_remove(). The vulnerability is due to the use of pm_runtime_get_sync(), which increments the PM reference count even when it fails, but the code does not properly decrement or balance this increment in failure scenarios. This leads to a reference leak, where the PM usage counter becomes unbalanced. Over time, this can cause the device to remain in an undesired power state, potentially leading to resource exhaustion or denial of service (DoS) conditions. The fix replaces pm_runtime_get_sync() with pm_runtime_resume_and_get(), which correctly manages the usage counter to prevent leaks. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially causing system instability or crashes due to improper power management. Exploitation requires local access with low privileges and high attack complexity, with no user interaction needed. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability primarily poses a risk to systems running Linux kernels with the affected Spreadtrum I2C driver, which may be embedded in specialized hardware or IoT devices. The impact is mainly on system availability, as the reference leak can cause power management issues leading to device instability or crashes. This can disrupt critical infrastructure or industrial control systems that rely on embedded Linux devices, especially in sectors like manufacturing, telecommunications, and transportation. While the vulnerability does not expose sensitive data or allow privilege escalation, the resulting denial of service could interrupt business operations or degrade service reliability. Organizations using Linux-based embedded systems with Spreadtrum chipsets should be particularly vigilant. The medium severity rating reflects the limited scope and complexity of exploitation but acknowledges the potential for operational disruption.
Mitigation Recommendations
European organizations should ensure that Linux kernel versions deployed on their devices are updated to include the patch replacing pm_runtime_get_sync() with pm_runtime_resume_and_get() in the Spreadtrum I2C driver. Since this is a kernel-level fix, applying vendor-supplied kernel updates or recompiling the kernel with the patched driver is essential. For embedded systems where kernel updates are challenging, organizations should work with hardware vendors to obtain patched firmware or kernel images. Additionally, monitoring device logs for power management anomalies and unexpected device resets can help detect exploitation attempts. Implementing strict access controls to limit local user access to trusted personnel reduces the risk of exploitation. Finally, organizations should maintain an inventory of devices using Spreadtrum chipsets to prioritize patching and risk assessment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-26T17:07:27.434Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea5cd
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 10:21:40 AM
Last updated: 8/3/2025, 4:54:26 AM
Views: 17
Related Threats
CVE-2025-8833: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-7965: CWE-352 Cross-Site Request Forgery (CSRF) in CBX Restaurant Booking
MediumCVE-2025-8832: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8831: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8829: OS Command Injection in Linksys RE6250
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.