CVE-2026-43357

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

iio: gyro: mpu3050-core: fix pm_runtime error handling

The return value of pm_runtime_get_sync() is not checked, allowing
the driver to access hardware that may fail to resume. The device
usage count is also unconditionally incremented. Use
pm_runtime_resume_and_get() which propagates errors and avoids
incrementing the usage count on failure.

In preenable, add pm_runtime_put_autosuspend() on set_8khz_samplerate()
failure since postdisable does not run when preenable fails.

https://git.kernel.org/stable/c/2a86a396aa001a9f9ba2d37dda36573a76f17c90
https://git.kernel.org/stable/c/35f54e7bcb1eccdc6e5bff06580eeef2e0ff3677
https://git.kernel.org/stable/c/42685cf96e28262e0b84d74447f3d99f3f6a72e0
https://git.kernel.org/stable/c/66c0d1d600e7be034959cf49edab104cb5a39258
https://git.kernel.org/stable/c/7a3dec5b265cf87678b10c98a72a435a8e769bb7
https://git.kernel.org/stable/c/8544c488e50206f00630a8bbba43d2c8bd290345
https://git.kernel.org/stable/c/935f57dd43492240e1ca220dd065d624efece6be
https://git.kernel.org/stable/c/acc3949aab3e8094641a9c7c2768de1958c88378