Description
In the Linux kernel, the following vulnerability has been resolved:

iio: accel: adxl380: Avoid reading more entries than present in FIFO

The interrupt handler reads FIFO entries in batches of N samples, where N
is the number of scan elements that have been enabled. However, the sensor
fills the FIFO one sample at a time, even when more than one channel is
enabled. Therefore,the number of entries reported by the FIFO status
registers may not be a multiple of N; if this number is not a multiple, the
number of entries read from the FIFO may exceed the number of entries
actually present.

To fix the above issue, round down the number of FIFO entries read from the
status registers so that it is always a multiple of N.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The ADXL380 IIO driver incorrectly calculates how many entries to read from the device FIFO when multiple scan elements are enabled. Because the sensor supplies one sample at a time even with several channels active, the driver’s read count can exceed the real number of entries. If more data is fetched than exists, the driver can read invalid memory, potentially corrupting kernel buffers and triggering a crash or unstable behavior. The advisory does not describe a direct exploit, but the over‑read represents a serious kernel memory safety issue.

Affected Systems

All Linux kernel releases that contain the pre‑fixed ADXL380 driver are affected. The specific kernel versions are not listed, but any build with the driver before the commit that rounds the FIFO count to a multiple of enabled scan elements is vulnerable. Systems running that driver module without the patch are at risk.

Risk and Exploitability

The CVSS score and EPSS value are not supplied, and the vulnerability is not listed in the CISA KEV catalog. The attack vector can only be inferred as local or requiring physical access to the device: an attacker would need to trigger the sensor interrupt and cause the driver to read the FIFO. Even without a known exploit, the possibility of kernel memory corruption makes this a high‑risk issue that could lead to denial of service. The fix is to apply the kernel patch that ensures the read count is rounded down to a multiple of the enabled scan elements.

Generated by OpenCVE AI on May 9, 2026 at 04:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel release that includes the patched ADXL380 driver
  • If immediate update is not possible, disable multi‑channel scanning for the ADXL380 (set scan_elements=0) to avoid FIFO overread
  • If the device cannot be reconfigured, unload or disable the ADXL380 driver until the patch is applied

Generated by OpenCVE AI on May 9, 2026 at 04:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-193

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-193

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: iio: accel: adxl380: Avoid reading more entries than present in FIFO The interrupt handler reads FIFO entries in batches of N samples, where N is the number of scan elements that have been enabled. However, the sensor fills the FIFO one sample at a time, even when more than one channel is enabled. Therefore,the number of entries reported by the FIFO status registers may not be a multiple of N; if this number is not a multiple, the number of entries read from the FIFO may exceed the number of entries actually present. To fix the above issue, round down the number of FIFO entries read from the status registers so that it is always a multiple of N.
Title iio: accel: adxl380: Avoid reading more entries than present in FIFO
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:26.295Z

Reserved: 2026-05-01T14:12:56.000Z

Link: CVE-2026-43307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:38.027

Modified: 2026-05-08T14:16:38.027

Link: CVE-2026-43307

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43307 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:00:10Z

Weaknesses