๐Ÿ” CVE Alert

CVE-2026-31768

UNKNOWN 0.0

iio: adc: ti-adc161s626: use DMA-safe memory for spi_read()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() Add a DMA-safe buffer and use it for spi_read() instead of a stack memory. All SPI buffers must be DMA-safe. Since we only need up to 3 bytes, we just use a u8[] instead of __be16 and __be32 and change the conversion functions appropriately.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
4d671b71beefbfc145b971a11e0c3cabde94b673 < b3bb8faeca1a2ef7be95ee8a512b639f9ffce947 4d671b71beefbfc145b971a11e0c3cabde94b673 < fa64aab25aba47296aa8d12bb4c88ec3fecb2054 4d671b71beefbfc145b971a11e0c3cabde94b673 < 67b3a91bdc48220bfb67155ab528121b9c822782 4d671b71beefbfc145b971a11e0c3cabde94b673 < 014c6d27878d3883f7bb065610768fd021de1a96 4d671b71beefbfc145b971a11e0c3cabde94b673 < d2d031b0786ea66ab0577c9d2d71435068d32199 4d671b71beefbfc145b971a11e0c3cabde94b673 < 768461517a28d80fe81ea4d5d03a90cd184ea6ad
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b3bb8faeca1a2ef7be95ee8a512b639f9ffce947 git.kernel.org: https://git.kernel.org/stable/c/fa64aab25aba47296aa8d12bb4c88ec3fecb2054 git.kernel.org: https://git.kernel.org/stable/c/67b3a91bdc48220bfb67155ab528121b9c822782 git.kernel.org: https://git.kernel.org/stable/c/014c6d27878d3883f7bb065610768fd021de1a96 git.kernel.org: https://git.kernel.org/stable/c/d2d031b0786ea66ab0577c9d2d71435068d32199 git.kernel.org: https://git.kernel.org/stable/c/768461517a28d80fe81ea4d5d03a90cd184ea6ad