CVE-2026-43357
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
12/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iio: gyro: mpu3050-core: fix pm_runtime error handling<br />
<br />
The return value of pm_runtime_get_sync() is not checked, allowing<br />
the driver to access hardware that may fail to resume. The device<br />
usage count is also unconditionally incremented. Use<br />
pm_runtime_resume_and_get() which propagates errors and avoids<br />
incrementing the usage count on failure.<br />
<br />
In preenable, add pm_runtime_put_autosuspend() on set_8khz_samplerate()<br />
failure since postdisable does not run when preenable fails.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2a86a396aa001a9f9ba2d37dda36573a76f17c90
- https://git.kernel.org/stable/c/35f54e7bcb1eccdc6e5bff06580eeef2e0ff3677
- https://git.kernel.org/stable/c/42685cf96e28262e0b84d74447f3d99f3f6a72e0
- https://git.kernel.org/stable/c/66c0d1d600e7be034959cf49edab104cb5a39258
- https://git.kernel.org/stable/c/7a3dec5b265cf87678b10c98a72a435a8e769bb7
- https://git.kernel.org/stable/c/8544c488e50206f00630a8bbba43d2c8bd290345
- https://git.kernel.org/stable/c/935f57dd43492240e1ca220dd065d624efece6be
- https://git.kernel.org/stable/c/acc3949aab3e8094641a9c7c2768de1958c88378



