CVE-2026-31763
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050: Fix incorrect free_irq() variable The handler for the IRQ part of this driver is mpu3050->trig but, in the tea
Details
In the Linux kernel, the following vulnerability has been resolved: iio: gyro: mpu3050: Fix incorrect free_irq() variable The handler for the IRQ part of this driver is mpu3050->trig but, in the teardown free_irq() is called with handler mpu3050. Use correct IRQ handler when calling free_irq().
Are YOU affected by CVE-2026-31763?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31763 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/11f7cd960f05b3f06747abfdc4e56dd0d8b8a157
- https://git.kernel.org/stable/c/2821f7b62c5b3633c4923c7e4f742380897cd511
- https://git.kernel.org/stable/c/8001b42fbd5e510dced3a25665019982c99bc708
- https://git.kernel.org/stable/c/8631e755fc07b651b5d158cc3656ef76cc874068
- https://git.kernel.org/stable/c/a09171d3f23e13bccd3dc34863186707c6301071
- https://git.kernel.org/stable/c/ac1233397f4cfe55d71f6aa459b42c256c951531
- https://git.kernel.org/stable/c/edb11a1aef4011a4b7b22cc3c3396c6fe371f4a6
- https://git.kernel.org/stable/c/fdbe4b5268cd41f9953d25a67d139e47cac34519
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.