High severity7.8NVD Advisory· Published May 13, 2026· Updated May 20, 2026
CVE-2026-43476
CVE-2026-43476
Description
In the Linux kernel, the following vulnerability has been resolved:
iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()
sizeof(num) evaluates to sizeof(size_t) (8 bytes on 64-bit) instead of the intended __be32 element size (4 bytes). Use sizeof(*meas) to correctly match the buffer element type.
Affected products
1Patches
7dcdf1e92674e9aff2e9c292790e978ace5982a4d111a6a34216345f98cae165f12b4090108881d82f94dVulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
7- git.kernel.org/stable/c/08881d82f94deaa51800360029908863e5c4c39dnvd
- git.kernel.org/stable/c/165f12b40901c6a7aca15796da239726ddcdc5adnvd
- git.kernel.org/stable/c/216345f98cae7fcc84f49728c67478ac00321c87nvd
- git.kernel.org/stable/c/2a4d111a6a34afb8bb4f118009e7728ed2ec7e10nvd
- git.kernel.org/stable/c/90e978ace598567e6e30de79805bddf37cf892acnvd
- git.kernel.org/stable/c/9aff2e9c2927ecd9652872a43a0725f101128104nvd
- git.kernel.org/stable/c/dcdf1e92674efb6692f4ebe189e0aa9fde23a541nvd
News mentions
0No linked articles in our index yet.