Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43476— iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()

AI Predicted 5.5 Difficulty: Moderate EPSS 0.02% · P7

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux8f3f130852785dac0759843835ca97c3bacc2b10< 9aff2e9c2927ecd9652872a43a0725f101128104affected
8f3f130852785dac0759843835ca97c3bacc2b10< 08881d82f94deaa51800360029908863e5c4c39daffected
8f3f130852785dac0759843835ca97c3bacc2b10< dcdf1e92674efb6692f4ebe189e0aa9fde23a541affected
8f3f130852785dac0759843835ca97c3bacc2b10< 2a4d111a6a34afb8bb4f118009e7728ed2ec7e10affected
8f3f130852785dac0759843835ca97c3bacc2b10< 90e978ace598567e6e30de79805bddf37cf892acaffected
8f3f130852785dac0759843835ca97c3bacc2b10< 165f12b40901c6a7aca15796da239726ddcdc5adaffected
8f3f130852785dac0759843835ca97c3bacc2b10< 216345f98cae7fcc84f49728c67478ac00321c87affected
5.14affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43476

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() sizeof(num) evaluates to sizeof(size_t) (8 bytes on 64-bit) instead of the intended __be32 element size (4 bytes). Use sizeof(*meas) to correctly match the buffer element type.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于sps30_i2c_read_meas函数中缓冲区大小计算错误,sizeof(num)在64位系统上返回8字节而非预期的4字节,可能导致内存操作异常。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 8f3f130852785dac0759843835ca97c3bacc2b10 ~ 9aff2e9c2927ecd9652872a43a0725f101128104 -
LinuxLinux 5.14 -

II. Public POCs for CVE-2026-43476

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43476

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-05-13 · 14 CVEs total

CVE-2026-43489liveupdate: luo_file: remember retrieve() status
CVE-2026-43487ata: libata-core: Disable LPM on ST1000DM010-2EP102
CVE-2026-43488usb: xhci: Prevent interrupt storm on host controller error (HCE)
CVE-2026-43485nouveau/gsp: drop WARN_ON in ACPI probes
CVE-2026-43486arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS faults
CVE-2026-43484mmc: core: Avoid bitfield RMW for claim/retune flags
CVE-2026-43482sched_ext: Disable preemption between scx_claim_exit() and kicking helper work
CVE-2026-43483KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated
CVE-2026-43480ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition
CVE-2026-43481net-shapers: don't free reply skb after genlmsg_reply()
CVE-2026-43479net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect
CVE-2026-43477drm/i915/vrr: Configure VRR timings after enabling TRANS_DDI_FUNC_CTL
CVE-2026-43478ASoC: codecs: rt1011: Use component to get the dapm context in spk_mode_put

IV. Related Vulnerabilities

V. Comments for CVE-2026-43476

No comments yet


Leave a comment