CVE-2026-43476

Published: Mag 13, 2026 Last Modified: Mag 13, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()

sizeof(num) evaluates to sizeof(size_t) (8 bytes on 64-bit) instead
of the intended __be32 element size (4 bytes). Use sizeof(*meas) to
correctly match the buffer element type.

https://git.kernel.org/stable/c/08881d82f94deaa51800360029908863e5c4c39d
https://git.kernel.org/stable/c/165f12b40901c6a7aca15796da239726ddcdc5ad
https://git.kernel.org/stable/c/216345f98cae7fcc84f49728c67478ac00321c87
https://git.kernel.org/stable/c/2a4d111a6a34afb8bb4f118009e7728ed2ec7e10
https://git.kernel.org/stable/c/90e978ace598567e6e30de79805bddf37cf892ac
https://git.kernel.org/stable/c/9aff2e9c2927ecd9652872a43a0725f101128104
https://git.kernel.org/stable/c/dcdf1e92674efb6692f4ebe189e0aa9fde23a541