Impact
A race condition exists in the Linux kernel MPU3050 gyro driver where iio_device_register() is called before the probe function completes; this ordering flaw could allow a local attacker to trigger concurrent probe operations and possibly corrupt kernel memory. Based on the description, the timing violation could lead to kernel state manipulation, which may in turn provide an avenue for privilege escalation.
Affected Systems
Linux kernel builds that include the MPU3050 gyro driver without the recent patch are vulnerable. Since the CNA product list identifies only Linux kernels under the cpe:2.3:o:linux:linux_kernel:* class, the issue applies across all kernel releases containing the unpatched driver, regardless of version specifics.
Risk and Exploitability
The CVSS score has not been disclosed, and the EPSS score is not available, indicating a lack of publicly observed exploitation data. The vulnerability is not present in the CISA KEV catalog. Exploitation would require local access to trigger the probe routine and race condition, making the attack vector local. While no definitive exploitation has been reported, the presence of a race condition that could lead to privilege escalation renders the risk significant for affected systems.
OpenCVE Enrichment
Debian DLA
Debian DSA