CVE-2026-31762
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050: Fix irq resource leak The interrupt handler is setup but only a few lines down if iio_trigger_register() fails
Details
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050: Fix irq resource leak The interrupt handler is setup but only a few lines down if iio_trigger_register() fails the function returns without properly releasing the handler. Add cleanup goto to resolve resource leak. Detected by Smatch: drivers/iio/gyro/mpu3050-core.c:1128 mpu3050_trigger_probe() warn: 'irq' from request_threaded_irq() not released on lines: 1124.
Are YOU affected by CVE-2026-31762?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31762 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/3a8e68d65a443de05061818823037931674740e0
- https://git.kernel.org/stable/c/4216db1043a3be72ef9c2b7b9f393d7fa72496e6
- https://git.kernel.org/stable/c/658d9deb45d5032baf388ac51991d1e789157334
- https://git.kernel.org/stable/c/889253494ec73d60bd47c0518f8fe3a748520d5b
- https://git.kernel.org/stable/c/8f237c408f3007d7d9667623ffb41a9e9d661ee9
- https://git.kernel.org/stable/c/b52fd1644ad2c4e96bbec97543a966d7ad8f21ea
- https://git.kernel.org/stable/c/beb23092571e627190f23da4bb8548065cacd89c
- https://git.kernel.org/stable/c/e66215fc1878357d5c980066e650f542330524af
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.