{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43316","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:56.001Z","datePublished":"2026-05-08T13:26:12.217Z","dateUpdated":"2026-05-11T22:22:12.135Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:22:12.135Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: solo6x10: Check for out of bounds chip_id\n\nClang with CONFIG_UBSAN_SHIFT=y noticed a condition where a signed type\n(literal \"1\" is an \"int\") could end up being shifted beyond 32 bits,\nso instrumentation was added (and due to the double is_tw286x() call\nseen via inlining), Clang decides the second one must now be undefined\nbehavior and elides the rest of the function[1]. This is a known problem\nwith Clang (that is still being worked on), but we can avoid the entire\nproblem by actually checking the existing max chip ID, and now there is\nno runtime instrumentation added at all since everything is known to be\nwithin bounds.\n\nAdditionally use an unsigned value for the shift to remove the\ninstrumentation even without the explicit bounds checking.\n\n[hverkuil: fix checkpatch warning for is_tw286x]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/pci/solo6x10/solo6x10-tw28.c"],"versions":[{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"c327192ca26670cf6e588c1eeda66cd2fa97630e","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"0b3dadada2417782a63ce32dae05bafe1c949e3f","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"603e3859393ee2ce91393b7d05e6e56e4b66e5cd","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"33af366211ee78e3b074ff44a16121e537e86826","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"5849ae68d7b8b6ad55cc1bf0d227dd2ae6362528","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"d29f33b2cf98e4901cd5457d1ee34062e808df73","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"4d6db0c6bbbfd8d7bbdbf7ab6a9c003752abf116","status":"affected","versionType":"git"},{"version":"faa4fd2a09517b39cc1f5d622453f97a59acfdac","lessThan":"0fdf6323c35a134f206dcad5babb4ff488552076","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/pci/solo6x10/solo6x10-tw28.c"],"versions":[{"version":"2.6.36","status":"affected"},{"version":"0","lessThan":"2.6.36","status":"unaffected","versionType":"semver"},{"version":"5.10.252","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.202","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.165","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.128","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.75","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.16","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.6","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"5.10.252"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"5.15.202"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"6.1.165"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"6.6.128"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"6.12.75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"6.18.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"6.19.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.36","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c327192ca26670cf6e588c1eeda66cd2fa97630e"},{"url":"https://git.kernel.org/stable/c/0b3dadada2417782a63ce32dae05bafe1c949e3f"},{"url":"https://git.kernel.org/stable/c/603e3859393ee2ce91393b7d05e6e56e4b66e5cd"},{"url":"https://git.kernel.org/stable/c/33af366211ee78e3b074ff44a16121e537e86826"},{"url":"https://git.kernel.org/stable/c/5849ae68d7b8b6ad55cc1bf0d227dd2ae6362528"},{"url":"https://git.kernel.org/stable/c/d29f33b2cf98e4901cd5457d1ee34062e808df73"},{"url":"https://git.kernel.org/stable/c/4d6db0c6bbbfd8d7bbdbf7ab6a9c003752abf116"},{"url":"https://git.kernel.org/stable/c/0fdf6323c35a134f206dcad5babb4ff488552076"}],"title":"media: solo6x10: Check for out of bounds chip_id","x_generator":{"engine":"bippy-1.2.0"}}}}