Impact
The mpu3050-core driver in the Linux kernel incorrectly handles the return value of pm_runtime_get_sync(), which means the driver can access hardware that has not successfully resumed and will unconditionally increase its usage count even on failure. This flaw can lead to unreliable device operation, incorrect power state handling, and potential resource leakage, manifesting as degraded device performance or system crashes when the driver interacts with the MPU3050 sensor.
Affected Systems
Linux kernel releases that include the mpu3050-core driver prior to the implementation of the fix. The specific kernel versions are not enumerated in the advisory, but any build containing the unpatched gyro driver is affected.
Risk and Exploitability
The CVSS score is not provided, and the EPSS score is unavailable. The vulnerability does not appear to be remotely exploitable; it requires local interaction with the MPU3050 device and the Linux kernel driver. Because the error conditions lead to device misbehavior rather than arbitrary code execution, the likelihood of exploitation is low to moderate, though repeated failures could degrade system stability. The advisory does not list the issue in CISA's KEV catalog.
OpenCVE Enrichment