CVE-2026-31768
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() Add a DMA-safe buffer and use it for spi_read() instead of a stack mem
Details
In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() Add a DMA-safe buffer and use it for spi_read() instead of a stack memory. All SPI buffers must be DMA-safe. Since we only need up to 3 bytes, we just use a u8[] instead of __be16 and __be32 and change the conversion functions appropriately.
Are YOU affected by CVE-2026-31768?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31768 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/014c6d27878d3883f7bb065610768fd021de1a96
- https://git.kernel.org/stable/c/67b3a91bdc48220bfb67155ab528121b9c822782
- https://git.kernel.org/stable/c/768461517a28d80fe81ea4d5d03a90cd184ea6ad
- https://git.kernel.org/stable/c/b3bb8faeca1a2ef7be95ee8a512b639f9ffce947
- https://git.kernel.org/stable/c/d2d031b0786ea66ab0577c9d2d71435068d32199
- https://git.kernel.org/stable/c/fa64aab25aba47296aa8d12bb4c88ec3fecb2054
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.