CVE-2026-43357
UNKNOWN
NVD
CVSS Score
0
Severity
UNKNOWN
Published
May 08, 2026
Vendor
unknown
Description
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050-core: fix pm_runtime error handling The return value of pm_runtime_get_sync() is not checked, allowing the driver to access hardware that may fail to resume. The device usage count is also unconditionally incremented. Use pm_runtime_resume_and_get() which propagates errors and avoids incrementing the usage count on failure. In preenable, add pm_runtime_put_autosuspend() on set_8khz_samplerate() failure since postdisable does not run when preenable fails.
References
- https://git.kernel.org/stable/c/2a86a396aa001a9f9ba2d37dda36573a76f17c90
- https://git.kernel.org/stable/c/35f54e7bcb1eccdc6e5bff06580eeef2e0ff3677
- https://git.kernel.org/stable/c/42685cf96e28262e0b84d74447f3d99f3f6a72e0
- https://git.kernel.org/stable/c/66c0d1d600e7be034959cf49edab104cb5a39258
- https://git.kernel.org/stable/c/7a3dec5b265cf87678b10c98a72a435a8e769bb7