CVE-2026-43357

medium

Description

In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050-core: fix pm_runtime error handling The return value of pm_runtime_get_sync() is not checked, allowing the driver to access hardware that may fail to resume. The device usage count is also unconditionally incremented. Use pm_runtime_resume_and_get() which propagates errors and avoids incrementing the usage count on failure. In preenable, add pm_runtime_put_autosuspend() on set_8khz_samplerate() failure since postdisable does not run when preenable fails.

References

https://git.kernel.org/stable/c/acc3949aab3e8094641a9c7c2768de1958c88378

https://git.kernel.org/stable/c/935f57dd43492240e1ca220dd065d624efece6be

https://git.kernel.org/stable/c/8544c488e50206f00630a8bbba43d2c8bd290345

https://git.kernel.org/stable/c/7a3dec5b265cf87678b10c98a72a435a8e769bb7

https://git.kernel.org/stable/c/66c0d1d600e7be034959cf49edab104cb5a39258

https://git.kernel.org/stable/c/42685cf96e28262e0b84d74447f3d99f3f6a72e0

https://git.kernel.org/stable/c/35f54e7bcb1eccdc6e5bff06580eeef2e0ff3677

https://git.kernel.org/stable/c/2a86a396aa001a9f9ba2d37dda36573a76f17c90

Details

Source: Mitre, NVD

Published: 2026-05-08

Updated: 2026-05-08

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium