Description
In the Linux kernel, the following vulnerability has been resolved:

iio: light: bh1780: fix PM runtime leak on error path

Move pm_runtime_put_autosuspend() before the error check to ensure
the PM runtime reference count is always decremented after
pm_runtime_get_sync(), regardless of whether the read operation
succeeds or fails.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The bh1780 driver in the Linux kernel previously had a bug that caused a power‑management runtime reference leak on error paths. The leak occurs when pm_runtime_get_sync() increments the reference count but the matching pm_runtime_put_autosuspend() call is executed after error handling, leaving the count sticky. Based on the description, it is inferred that repeated failures could accumulate the counter, potentially leading to exhaustion of internal power‑management structures and degrading system reliability and availability.

Affected Systems

Any Linux kernel installation that includes the bh1780 IIO light driver and has not been updated to the fixed kernel version is affected. The fixed code is part of the official Linux kernel tree; however, no specific release version range is enumerated in the advisory.

Risk and Exploitability

The vulnerability does not expose a clear remote attack vector, and it is not listed in CISA KEV, which indicates no currently known commercial exploitation. The EPSS score is not available; therefore, no publicly observed exploitation probability is reported. Based on the lack of an explicit attack vector and its absence from KEV, it is inferred that exploitation would require an attacker to repeatedly trigger error conditions in bh1780. This may be difficult in typical usage, but if achieved, the accumulated reference count could lead to a denial‑of‑service by exhausting kernel power‑management resources.

Generated by OpenCVE AI on May 9, 2026 at 02:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest Linux kernel release that incorporates the bh1780 driver fix.
  • If developing or maintaining custom kernel modules, ensure pm_runtime_put_autosuspend() is called before any error checks that could return early after a pm_runtime_get_sync() call.
  • Monitor system logs and runtime statistics for abnormal growth in power‑management reference counts or kernel warnings related to the bh1780 driver.

Generated by OpenCVE AI on May 9, 2026 at 02:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: iio: light: bh1780: fix PM runtime leak on error path Move pm_runtime_put_autosuspend() before the error check to ensure the PM runtime reference count is always decremented after pm_runtime_get_sync(), regardless of whether the read operation succeeds or fails.
Title iio: light: bh1780: fix PM runtime leak on error path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:11.609Z

Reserved: 2026-05-01T14:12:56.005Z

Link: CVE-2026-43355

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:46.250

Modified: 2026-05-08T15:16:46.250

Link: CVE-2026-43355

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43355 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T02:15:06Z

Weaknesses