Impact
The MPU3050 gyroscope driver in the Linux kernel contains a flaw where the interrupt handler is not released if the iio_trigger_register() call fails. The flaw qualifies as a Resource Leak (CWE-772) because the IRQ handler is not cleaned up. This leaves an allocated IRQ handler that is never freed, resulting in a kernel resource leak. While the vulnerability does not provide direct code execution or privilege escalation, exhausting IRQ resources can degrade interrupt handling and overall system stability, potentially causing a denial of service.
Affected Systems
All Linux kernel implementations that include the MPU3050 gyroscope driver are affected. The issue manifests in the generic Linux kernel, regardless of distribution, as long as the driver is compiled into the kernel or loaded as a module. No specific vendor or distribution versions are listed, so any kernel that has not yet incorporated the recent commit that adds the cleanup goto is susceptible.
Risk and Exploitability
There is no EPSS score available and the vulnerability is not listed in the CISA KEV catalog, indicating limited or unknown exploitation activity. The CVSS score is not provided, yet the nature of a persistent IRQ leak suggests a moderate to high severity because repeated failures can accumulate and exhaust kernel resources. A local attacker with the ability to provoke repeated trigger registration failures could accelerate the leak. The likely attack vector is a local process that can interact with the device via the iIO subsystem, though no external network vector is indicated.
OpenCVE Enrichment
Debian DLA
Debian DSA