CVE-2026-43316
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
15/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: solo6x10: Check for out of bounds chip_id<br />
<br />
Clang with CONFIG_UBSAN_SHIFT=y noticed a condition where a signed type<br />
(literal "1" is an "int") could end up being shifted beyond 32 bits,<br />
so instrumentation was added (and due to the double is_tw286x() call<br />
seen via inlining), Clang decides the second one must now be undefined<br />
behavior and elides the rest of the function[1]. This is a known problem<br />
with Clang (that is still being worked on), but we can avoid the entire<br />
problem by actually checking the existing max chip ID, and now there is<br />
no runtime instrumentation added at all since everything is known to be<br />
within bounds.<br />
<br />
Additionally use an unsigned value for the shift to remove the<br />
instrumentation even without the explicit bounds checking.<br />
<br />
[hverkuil: fix checkpatch warning for is_tw286x]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.36 (including) | 5.10.252 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.202 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.165 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.128 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0b3dadada2417782a63ce32dae05bafe1c949e3f
- https://git.kernel.org/stable/c/0fdf6323c35a134f206dcad5babb4ff488552076
- https://git.kernel.org/stable/c/33af366211ee78e3b074ff44a16121e537e86826
- https://git.kernel.org/stable/c/4d6db0c6bbbfd8d7bbdbf7ab6a9c003752abf116
- https://git.kernel.org/stable/c/5849ae68d7b8b6ad55cc1bf0d227dd2ae6362528
- https://git.kernel.org/stable/c/603e3859393ee2ce91393b7d05e6e56e4b66e5cd
- https://git.kernel.org/stable/c/c327192ca26670cf6e588c1eeda66cd2fa97630e
- https://git.kernel.org/stable/c/d29f33b2cf98e4901cd5457d1ee34062e808df73



