Impact
A buffer on the stack was used for SPI read operations in the TI ADC161S626 driver, which is not DMA‑safe and may allow DMA transfers to read or write outside the intended memory region. The fix replaces that stack buffer with a DMA‑safe u8[] buffer and adjusts conversion logic, preventing unauthorized kernel memory corruption. The weakness corresponds to improper input handling leading to buffer overflows (CWE‑120).
Affected Systems
Any Linux kernel build that includes the iio:adc:ti-adc161s626 driver before the patch is vulnerable. Systems running those kernel versions with the driver enabled for hardware that performs SPI reads are at risk.
Risk and Exploitability
Specific exploitation requires hardware access to trigger an SPI read under conditions that exploit the DMA‑unsafe buffer. The CVSS score of 7.8 places this vulnerability in the high‑severity range, and the EPSS score of <1% indicates exploitation is unlikely. The vulnerability is not listed in the CISA KEV catalog. If exploited, memory corruption could destabilize the system or expose sensitive data depending on which kernel region is overwritten.
OpenCVE Enrichment
Debian DLA
Debian DSA