Impact
The bh1780 driver in the Linux kernel previously had a bug that caused a power‑management runtime reference leak on error paths. The leak occurs when pm_runtime_get_sync() increments the reference count but the matching pm_runtime_put_autosuspend() call is executed after error handling, leaving the count sticky. Based on the description, it is inferred that repeated failures could accumulate the counter, potentially leading to exhaustion of internal power‑management structures and degrading system reliability and availability.
Affected Systems
Any Linux kernel installation that includes the bh1780 IIO light driver and has not been updated to the fixed kernel version is affected. The fixed code is part of the official Linux kernel tree; however, no specific release version range is enumerated in the advisory.
Risk and Exploitability
The vulnerability does not expose a clear remote attack vector, and it is not listed in CISA KEV, which indicates no currently known commercial exploitation. The EPSS score is not available; therefore, no publicly observed exploitation probability is reported. Based on the lack of an explicit attack vector and its absence from KEV, it is inferred that exploitation would require an attacker to repeatedly trigger error conditions in bh1780. This may be difficult in typical usage, but if achieved, the accumulated reference count could lead to a denial‑of‑service by exhausting kernel power‑management resources.
OpenCVE Enrichment