CVE-2026-31768
Buffer Overflow Fix in Linux Kernel IIO ADC Driver
Publication date: 2026-05-01
Last updated on: 2026-05-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ti | ti-adc161s626 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of SPI read operations in the ti-adc161s626 driver. Specifically, the driver was using stack memory for spi_read(), which is not safe for Direct Memory Access (DMA) operations. The fix involves adding a DMA-safe buffer and using it for spi_read() instead of stack memory, ensuring that all SPI buffers are DMA-safe.
How can this vulnerability impact me? :
Using stack memory for DMA operations can lead to undefined behavior, including data corruption or system instability. This vulnerability could potentially cause incorrect data to be read from the ADC device or cause kernel crashes, impacting system reliability and data integrity.