CVE-2020-36783: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: i2c: img-scb: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in functions img_i2c_xfer and img_i2c_init. However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI Analysis
Technical Summary
CVE-2020-36783 is a vulnerability identified in the Linux kernel specifically related to the i2c subsystem, more precisely the img-scb driver component. The issue arises from improper handling of the power management (PM) reference count when the function pm_runtime_get_sync fails. Normally, pm_runtime_get_sync increments the PM reference count to indicate active usage of a device, and this count should be balanced by a corresponding decrement to avoid resource leaks. However, in the affected code paths within img_i2c_xfer and img_i2c_init functions, pm_runtime_get_sync increments the reference count even on failure, but the code does not decrement it accordingly, leading to a reference leak. This leak can cause the PM usage counter to become unbalanced, potentially preventing the device from entering low power states or causing resource exhaustion over time. The fix replaces pm_runtime_get_sync with pm_runtime_resume_and_get, which correctly manages the usage counter by only incrementing it when the device is resumed successfully, thus maintaining proper reference counting. Although this vulnerability does not directly allow code execution or privilege escalation, it can degrade system stability and power management efficiency, especially on devices relying on the img-scb i2c driver. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2020-36783 primarily concerns systems running Linux kernels with the affected img-scb i2c driver, which is often found in embedded devices or specialized hardware platforms. The vulnerability could lead to resource leaks causing degraded device performance, increased power consumption, or potential device unavailability due to improper power management. This is particularly relevant for industries relying on embedded Linux systems such as telecommunications, industrial automation, automotive, and IoT deployments prevalent in Europe. Over time, the reference leak could cause system instability or failures, impacting operational continuity and increasing maintenance costs. While it does not directly compromise confidentiality or integrity, the availability and reliability of critical infrastructure components could be affected, which is a significant concern for sectors like energy, manufacturing, and transportation. European organizations with large-scale Linux deployments should assess their exposure, especially where power management and device uptime are critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should apply the official Linux kernel patches that replace pm_runtime_get_sync with pm_runtime_resume_and_get in the img-scb i2c driver code. This ensures proper reference counting and prevents resource leaks. System administrators should verify that their Linux kernel versions include this fix or upgrade to a patched kernel release. For embedded devices or custom Linux distributions, vendors should be contacted to provide updated firmware or kernel versions incorporating the patch. Additionally, monitoring tools should be employed to detect abnormal power management behavior or resource leaks that could indicate unpatched systems. Implementing rigorous testing of power management functions during kernel updates can help identify regressions related to this issue. Since no known exploits exist, prioritizing patch deployment in environments where device availability and power efficiency are critical is advised. Finally, maintaining an inventory of devices using the img-scb i2c driver will help focus remediation efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2020-36783: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: i2c: img-scb: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in functions img_i2c_xfer and img_i2c_init. However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
AI-Powered Analysis
Technical Analysis
CVE-2020-36783 is a vulnerability identified in the Linux kernel specifically related to the i2c subsystem, more precisely the img-scb driver component. The issue arises from improper handling of the power management (PM) reference count when the function pm_runtime_get_sync fails. Normally, pm_runtime_get_sync increments the PM reference count to indicate active usage of a device, and this count should be balanced by a corresponding decrement to avoid resource leaks. However, in the affected code paths within img_i2c_xfer and img_i2c_init functions, pm_runtime_get_sync increments the reference count even on failure, but the code does not decrement it accordingly, leading to a reference leak. This leak can cause the PM usage counter to become unbalanced, potentially preventing the device from entering low power states or causing resource exhaustion over time. The fix replaces pm_runtime_get_sync with pm_runtime_resume_and_get, which correctly manages the usage counter by only incrementing it when the device is resumed successfully, thus maintaining proper reference counting. Although this vulnerability does not directly allow code execution or privilege escalation, it can degrade system stability and power management efficiency, especially on devices relying on the img-scb i2c driver. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2020-36783 primarily concerns systems running Linux kernels with the affected img-scb i2c driver, which is often found in embedded devices or specialized hardware platforms. The vulnerability could lead to resource leaks causing degraded device performance, increased power consumption, or potential device unavailability due to improper power management. This is particularly relevant for industries relying on embedded Linux systems such as telecommunications, industrial automation, automotive, and IoT deployments prevalent in Europe. Over time, the reference leak could cause system instability or failures, impacting operational continuity and increasing maintenance costs. While it does not directly compromise confidentiality or integrity, the availability and reliability of critical infrastructure components could be affected, which is a significant concern for sectors like energy, manufacturing, and transportation. European organizations with large-scale Linux deployments should assess their exposure, especially where power management and device uptime are critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should apply the official Linux kernel patches that replace pm_runtime_get_sync with pm_runtime_resume_and_get in the img-scb i2c driver code. This ensures proper reference counting and prevents resource leaks. System administrators should verify that their Linux kernel versions include this fix or upgrade to a patched kernel release. For embedded devices or custom Linux distributions, vendors should be contacted to provide updated firmware or kernel versions incorporating the patch. Additionally, monitoring tools should be employed to detect abnormal power management behavior or resource leaks that could indicate unpatched systems. Implementing rigorous testing of power management functions during kernel updates can help identify regressions related to this issue. Since no known exploits exist, prioritizing patch deployment in environments where device availability and power efficiency are critical is advised. Finally, maintaining an inventory of devices using the img-scb i2c driver will help focus remediation efforts effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-26T17:07:27.435Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea5df
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 10:21:05 AM
Last updated: 8/17/2025, 9:56:18 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.