← Voltar para CVEs
CVE-2026-31768
HIGH7.8
Descricao
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() Add a DMA-safe buffer and use it for spi_read() instead of a stack memory. All SPI buffers must be DMA-safe. Since we only need up to 3 bytes, we just use a u8[] instead of __be16 and __be32 and change the conversion functions appropriately.
Detalhes CVE
Pontuacao CVSS v3.17.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado5/1/2026
Ultima modificacao5/3/2026
Fontenvd
Avistamentos honeypot0
Referencias
https://git.kernel.org/stable/c/014c6d27878d3883f7bb065610768fd021de1a96(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/67b3a91bdc48220bfb67155ab528121b9c822782(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/768461517a28d80fe81ea4d5d03a90cd184ea6ad(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/b3bb8faeca1a2ef7be95ee8a512b639f9ffce947(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/d2d031b0786ea66ab0577c9d2d71435068d32199(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/fa64aab25aba47296aa8d12bb4c88ec3fecb2054(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.