CVE-2026-43247 (GCVE-0-2026-43247)
Vulnerability from cvelistv5 – Published: 2026-05-06 11:28 – Updated: 2026-05-06 11:28
VLAI?
Title
media: chips-media: wave5: Fix SError of kernel panic when closed
Summary
In the Linux kernel, the following vulnerability has been resolved:
media: chips-media: wave5: Fix SError of kernel panic when closed
SError of kernel panic rarely happened while testing fluster.
The root cause was to enter suspend mode because timeout of autosuspend
delay happened.
[ 48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError
[ 48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7
[ 48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025
[ 48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]
[ 48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]
[ 48.834495] sp : ffff8000856e3a30
[ 48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130
[ 48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80
[ 48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000
[ 48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000
[ 48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618
[ 48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000
[ 48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028
[ 48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000
[ 48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000
[ 48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000
[ 48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt
[ 48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7
[ 48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025
[ 48.834556] Call trace:
[ 48.834559] dump_backtrace+0x94/0xec
[ 48.834574] show_stack+0x18/0x24
[ 48.834579] dump_stack_lvl+0x38/0x90
[ 48.834585] dump_stack+0x18/0x24
[ 48.834588] panic+0x35c/0x3e0
[ 48.834592] nmi_panic+0x40/0x8c
[ 48.834595] arm64_serror_panic+0x64/0x70
[ 48.834598] do_serror+0x3c/0x78
[ 48.834601] el1h_64_error_handler+0x34/0x4c
[ 48.834605] el1h_64_error+0x64/0x68
[ 48.834608] wave5_dec_clr_disp_flag+0x40/0x80 [wave5]
[ 48.834615] wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5]
[ 48.834622] wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5]
[ 48.834628] __enqueue_in_driver+0x3c/0x74 [videobuf2_common]
[ 48.834639] vb2_core_qbuf+0x508/0x61c [videobuf2_common]
[ 48.834646] vb2_qbuf+0xa4/0x168 [videobuf2_v4l2]
[ 48.834656] v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem]
[ 48.834666] v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem]
[ 48.834673] v4l_qbuf+0x48/0x5c [videodev]
[ 48.834704] __video_do_ioctl+0x180/0x3f0 [videodev]
[ 48.834725] video_usercopy+0x2ec/0x68c [videodev]
[ 48.834745] video_ioctl2+0x18/0x24 [videodev]
[ 48.834766] v4l2_ioctl+0x40/0x60 [videodev]
[ 48.834786] __arm64_sys_ioctl+0xa8/0xec
[ 48.834793] invoke_syscall+0x44/0x100
[ 48.834800] el0_svc_common.constprop.0+0xc0/0xe0
[ 48.834804] do_el0_svc+0x1c/0x28
[ 48.834809] el0_svc+0x30/0xd0
[ 48.834813] el0t_64_sync_handler+0xc0/0xc4
[ 48.834816] el0t_64_sync+0x190/0x194
[ 48.834820] SMP: stopping secondary CPUs
[ 48.834831] Kernel Offset: disabled
[ 48.834833] CPU features: 0x08,00002002,80200000,4200421b
[ 48.834837] Memory Limit: none
[ 49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < 27cb12b7dc88c51582094eeb2b65b0e94603e411
(git)
Affected: 2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < 5da55243fe190c2165ed34e77091a43c0ff74f10 (git) Affected: 2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < cbb9c0d50e471483cced55f5b7db4569dcd959a6 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/chips-media/wave5/wave5-vpu-dec.c",
"drivers/media/platform/chips-media/wave5/wave5-vpu-enc.c",
"drivers/media/platform/chips-media/wave5/wave5-vpu.c",
"drivers/media/platform/chips-media/wave5/wave5-vpuapi.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "27cb12b7dc88c51582094eeb2b65b0e94603e411",
"status": "affected",
"version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
"versionType": "git"
},
{
"lessThan": "5da55243fe190c2165ed34e77091a43c0ff74f10",
"status": "affected",
"version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
"versionType": "git"
},
{
"lessThan": "cbb9c0d50e471483cced55f5b7db4569dcd959a6",
"status": "affected",
"version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/chips-media/wave5/wave5-vpu-dec.c",
"drivers/media/platform/chips-media/wave5/wave5-vpu-enc.c",
"drivers/media/platform/chips-media/wave5/wave5-vpu.c",
"drivers/media/platform/chips-media/wave5/wave5-vpuapi.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.13"
},
{
"lessThan": "6.13",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.16",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.6",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.13",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: chips-media: wave5: Fix SError of kernel panic when closed\n\nSError of kernel panic rarely happened while testing fluster.\nThe root cause was to enter suspend mode because timeout of autosuspend\ndelay happened.\n\n[ 48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError\n[ 48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\n[ 48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\n[ 48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[ 48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[ 48.834495] sp : ffff8000856e3a30\n[ 48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130\n[ 48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80\n[ 48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000\n[ 48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000\n[ 48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618\n[ 48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000\n[ 48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028\n[ 48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000\n[ 48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000\n[ 48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000\n[ 48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt\n[ 48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\n[ 48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\n[ 48.834556] Call trace:\n[ 48.834559] dump_backtrace+0x94/0xec\n[ 48.834574] show_stack+0x18/0x24\n[ 48.834579] dump_stack_lvl+0x38/0x90\n[ 48.834585] dump_stack+0x18/0x24\n[ 48.834588] panic+0x35c/0x3e0\n[ 48.834592] nmi_panic+0x40/0x8c\n[ 48.834595] arm64_serror_panic+0x64/0x70\n[ 48.834598] do_serror+0x3c/0x78\n[ 48.834601] el1h_64_error_handler+0x34/0x4c\n[ 48.834605] el1h_64_error+0x64/0x68\n[ 48.834608] wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[ 48.834615] wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5]\n[ 48.834622] wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5]\n[ 48.834628] __enqueue_in_driver+0x3c/0x74 [videobuf2_common]\n[ 48.834639] vb2_core_qbuf+0x508/0x61c [videobuf2_common]\n[ 48.834646] vb2_qbuf+0xa4/0x168 [videobuf2_v4l2]\n[ 48.834656] v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem]\n[ 48.834666] v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem]\n[ 48.834673] v4l_qbuf+0x48/0x5c [videodev]\n[ 48.834704] __video_do_ioctl+0x180/0x3f0 [videodev]\n[ 48.834725] video_usercopy+0x2ec/0x68c [videodev]\n[ 48.834745] video_ioctl2+0x18/0x24 [videodev]\n[ 48.834766] v4l2_ioctl+0x40/0x60 [videodev]\n[ 48.834786] __arm64_sys_ioctl+0xa8/0xec\n[ 48.834793] invoke_syscall+0x44/0x100\n[ 48.834800] el0_svc_common.constprop.0+0xc0/0xe0\n[ 48.834804] do_el0_svc+0x1c/0x28\n[ 48.834809] el0_svc+0x30/0xd0\n[ 48.834813] el0t_64_sync_handler+0xc0/0xc4\n[ 48.834816] el0t_64_sync+0x190/0x194\n[ 48.834820] SMP: stopping secondary CPUs\n[ 48.834831] Kernel Offset: disabled\n[ 48.834833] CPU features: 0x08,00002002,80200000,4200421b\n[ 48.834837] Memory Limit: none\n[ 49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---"
}
],
"providerMetadata": {
"dateUpdated": "2026-05-06T11:28:38.902Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/27cb12b7dc88c51582094eeb2b65b0e94603e411"
},
{
"url": "https://git.kernel.org/stable/c/5da55243fe190c2165ed34e77091a43c0ff74f10"
},
{
"url": "https://git.kernel.org/stable/c/cbb9c0d50e471483cced55f5b7db4569dcd959a6"
}
],
"title": "media: chips-media: wave5: Fix SError of kernel panic when closed",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43247",
"datePublished": "2026-05-06T11:28:38.902Z",
"dateReserved": "2026-05-01T14:12:55.996Z",
"dateUpdated": "2026-05-06T11:28:38.902Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43247\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:45.237\",\"lastModified\":\"2026-05-06T13:07:51.607\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: chips-media: wave5: Fix SError of kernel panic when closed\\n\\nSError of kernel panic rarely happened while testing fluster.\\nThe root cause was to enter suspend mode because timeout of autosuspend\\ndelay happened.\\n\\n[ 48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError\\n[ 48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\\n[ 48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\\n[ 48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n[ 48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[ 48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[ 48.834495] sp : ffff8000856e3a30\\n[ 48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130\\n[ 48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80\\n[ 48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000\\n[ 48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000\\n[ 48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618\\n[ 48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000\\n[ 48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028\\n[ 48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000\\n[ 48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000\\n[ 48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000\\n[ 48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt\\n[ 48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\\n[ 48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\\n[ 48.834556] Call trace:\\n[ 48.834559] dump_backtrace+0x94/0xec\\n[ 48.834574] show_stack+0x18/0x24\\n[ 48.834579] dump_stack_lvl+0x38/0x90\\n[ 48.834585] dump_stack+0x18/0x24\\n[ 48.834588] panic+0x35c/0x3e0\\n[ 48.834592] nmi_panic+0x40/0x8c\\n[ 48.834595] arm64_serror_panic+0x64/0x70\\n[ 48.834598] do_serror+0x3c/0x78\\n[ 48.834601] el1h_64_error_handler+0x34/0x4c\\n[ 48.834605] el1h_64_error+0x64/0x68\\n[ 48.834608] wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[ 48.834615] wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5]\\n[ 48.834622] wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5]\\n[ 48.834628] __enqueue_in_driver+0x3c/0x74 [videobuf2_common]\\n[ 48.834639] vb2_core_qbuf+0x508/0x61c [videobuf2_common]\\n[ 48.834646] vb2_qbuf+0xa4/0x168 [videobuf2_v4l2]\\n[ 48.834656] v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem]\\n[ 48.834666] v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem]\\n[ 48.834673] v4l_qbuf+0x48/0x5c [videodev]\\n[ 48.834704] __video_do_ioctl+0x180/0x3f0 [videodev]\\n[ 48.834725] video_usercopy+0x2ec/0x68c [videodev]\\n[ 48.834745] video_ioctl2+0x18/0x24 [videodev]\\n[ 48.834766] v4l2_ioctl+0x40/0x60 [videodev]\\n[ 48.834786] __arm64_sys_ioctl+0xa8/0xec\\n[ 48.834793] invoke_syscall+0x44/0x100\\n[ 48.834800] el0_svc_common.constprop.0+0xc0/0xe0\\n[ 48.834804] do_el0_svc+0x1c/0x28\\n[ 48.834809] el0_svc+0x30/0xd0\\n[ 48.834813] el0t_64_sync_handler+0xc0/0xc4\\n[ 48.834816] el0t_64_sync+0x190/0x194\\n[ 48.834820] SMP: stopping secondary CPUs\\n[ 48.834831] Kernel Offset: disabled\\n[ 48.834833] CPU features: 0x08,00002002,80200000,4200421b\\n[ 48.834837] Memory Limit: none\\n[ 49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/27cb12b7dc88c51582094eeb2b65b0e94603e411\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5da55243fe190c2165ed34e77091a43c0ff74f10\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cbb9c0d50e471483cced55f5b7db4569dcd959a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…