Description
In the Linux kernel, the following vulnerability has been resolved:

iio: gyro: mpu3050: Fix irq resource leak

The interrupt handler is setup but only a few lines down if
iio_trigger_register() fails the function returns without properly
releasing the handler.

Add cleanup goto to resolve resource leak.

Detected by Smatch:
drivers/iio/gyro/mpu3050-core.c:1128 mpu3050_trigger_probe() warn:
'irq' from request_threaded_irq() not released on lines: 1124.
Published: 2026-05-01
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The MPU3050 gyroscope driver in the Linux kernel contains a flaw where the interrupt handler is not released if the iio_trigger_register() call fails. The flaw qualifies as a Resource Leak (CWE-772) because the IRQ handler is not cleaned up. This leaves an allocated IRQ handler that is never freed, resulting in a kernel resource leak. While the vulnerability does not provide direct code execution or privilege escalation, exhausting IRQ resources can degrade interrupt handling and overall system stability, potentially causing a denial of service.

Affected Systems

All Linux kernel implementations that include the MPU3050 gyroscope driver are affected. The issue manifests in the generic Linux kernel, regardless of distribution, as long as the driver is compiled into the kernel or loaded as a module. No specific vendor or distribution versions are listed, so any kernel that has not yet incorporated the recent commit that adds the cleanup goto is susceptible.

Risk and Exploitability

There is no EPSS score available and the vulnerability is not listed in the CISA KEV catalog, indicating limited or unknown exploitation activity. The CVSS score is not provided, yet the nature of a persistent IRQ leak suggests a moderate to high severity because repeated failures can accumulate and exhaust kernel resources. A local attacker with the ability to provoke repeated trigger registration failures could accelerate the leak. The likely attack vector is a local process that can interact with the device via the iIO subsystem, though no external network vector is indicated.

Generated by OpenCVE AI on May 2, 2026 at 11:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the cleanup goto patch. The fix is available in recent kernel commits; applying the latest stable kernel or backporting the patch will resolve the leak.
  • If an update is not immediately possible, manually apply the patch from the listed kernel commit references: apply the code changes that add the cleanup goto for the IRQ handler.
  • Disable or remove the MPU3050 gyroscope driver if the device is not required, preventing registration failures from leaking IRQ resources.
  • Continuously monitor kernel logs for messages related to iio_trigger_register failures, and verify that no residual IRQ handlers accumulate.

Generated by OpenCVE AI on May 2, 2026 at 11:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-577

Sat, 02 May 2026 00:15:00 +0000


Fri, 01 May 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-577

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050: Fix irq resource leak The interrupt handler is setup but only a few lines down if iio_trigger_register() fails the function returns without properly releasing the handler. Add cleanup goto to resolve resource leak. Detected by Smatch: drivers/iio/gyro/mpu3050-core.c:1128 mpu3050_trigger_probe() warn: 'irq' from request_threaded_irq() not released on lines: 1124.
Title iio: gyro: mpu3050: Fix irq resource leak
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:53.891Z

Reserved: 2026-03-09T15:48:24.139Z

Link: CVE-2026-31762

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:39.277

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31762

cve-icon Redhat

Severity :

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31762 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:30:40Z

Weaknesses