CVE-2026-43247 (GCVE-0-2026-43247)

Vulnerability from cvelistv5 – Published: 2026-05-06 11:28 – Updated: 2026-05-06 11:28
VLAI?
Title
media: chips-media: wave5: Fix SError of kernel panic when closed
Summary
In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix SError of kernel panic when closed SError of kernel panic rarely happened while testing fluster. The root cause was to enter suspend mode because timeout of autosuspend delay happened. [ 48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError [ 48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7 [ 48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025 [ 48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5] [ 48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5] [ 48.834495] sp : ffff8000856e3a30 [ 48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130 [ 48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80 [ 48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000 [ 48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000 [ 48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618 [ 48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000 [ 48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028 [ 48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000 [ 48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000 [ 48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000 [ 48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt [ 48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7 [ 48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025 [ 48.834556] Call trace: [ 48.834559] dump_backtrace+0x94/0xec [ 48.834574] show_stack+0x18/0x24 [ 48.834579] dump_stack_lvl+0x38/0x90 [ 48.834585] dump_stack+0x18/0x24 [ 48.834588] panic+0x35c/0x3e0 [ 48.834592] nmi_panic+0x40/0x8c [ 48.834595] arm64_serror_panic+0x64/0x70 [ 48.834598] do_serror+0x3c/0x78 [ 48.834601] el1h_64_error_handler+0x34/0x4c [ 48.834605] el1h_64_error+0x64/0x68 [ 48.834608] wave5_dec_clr_disp_flag+0x40/0x80 [wave5] [ 48.834615] wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5] [ 48.834622] wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5] [ 48.834628] __enqueue_in_driver+0x3c/0x74 [videobuf2_common] [ 48.834639] vb2_core_qbuf+0x508/0x61c [videobuf2_common] [ 48.834646] vb2_qbuf+0xa4/0x168 [videobuf2_v4l2] [ 48.834656] v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem] [ 48.834666] v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem] [ 48.834673] v4l_qbuf+0x48/0x5c [videodev] [ 48.834704] __video_do_ioctl+0x180/0x3f0 [videodev] [ 48.834725] video_usercopy+0x2ec/0x68c [videodev] [ 48.834745] video_ioctl2+0x18/0x24 [videodev] [ 48.834766] v4l2_ioctl+0x40/0x60 [videodev] [ 48.834786] __arm64_sys_ioctl+0xa8/0xec [ 48.834793] invoke_syscall+0x44/0x100 [ 48.834800] el0_svc_common.constprop.0+0xc0/0xe0 [ 48.834804] do_el0_svc+0x1c/0x28 [ 48.834809] el0_svc+0x30/0xd0 [ 48.834813] el0t_64_sync_handler+0xc0/0xc4 [ 48.834816] el0t_64_sync+0x190/0x194 [ 48.834820] SMP: stopping secondary CPUs [ 48.834831] Kernel Offset: disabled [ 48.834833] CPU features: 0x08,00002002,80200000,4200421b [ 48.834837] Memory Limit: none [ 49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < 27cb12b7dc88c51582094eeb2b65b0e94603e411 (git)
Affected: 2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < 5da55243fe190c2165ed34e77091a43c0ff74f10 (git)
Affected: 2092b3833487e5ce138f4303f98e46ba0f87f1d0 , < cbb9c0d50e471483cced55f5b7db4569dcd959a6 (git)
Create a notification for this product.
    Linux Linux Affected: 6.13
Unaffected: 0 , < 6.13 (semver)
Unaffected: 6.18.16 , ≤ 6.18.* (semver)
Unaffected: 6.19.6 , ≤ 6.19.* (semver)
Unaffected: 7.0 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/platform/chips-media/wave5/wave5-vpu-dec.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpu-enc.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpu.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpuapi.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "27cb12b7dc88c51582094eeb2b65b0e94603e411",
              "status": "affected",
              "version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
              "versionType": "git"
            },
            {
              "lessThan": "5da55243fe190c2165ed34e77091a43c0ff74f10",
              "status": "affected",
              "version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
              "versionType": "git"
            },
            {
              "lessThan": "cbb9c0d50e471483cced55f5b7db4569dcd959a6",
              "status": "affected",
              "version": "2092b3833487e5ce138f4303f98e46ba0f87f1d0",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/platform/chips-media/wave5/wave5-vpu-dec.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpu-enc.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpu.c",
            "drivers/media/platform/chips-media/wave5/wave5-vpuapi.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.13"
            },
            {
              "lessThan": "6.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.19.*",
              "status": "unaffected",
              "version": "6.19.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.16",
                  "versionStartIncluding": "6.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.6",
                  "versionStartIncluding": "6.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "7.0",
                  "versionStartIncluding": "6.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: chips-media: wave5: Fix SError of kernel panic when closed\n\nSError of kernel panic rarely happened while testing fluster.\nThe root cause was to enter suspend mode because timeout of autosuspend\ndelay happened.\n\n[   48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError\n[   48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\n[   48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\n[   48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[   48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[   48.834495] sp : ffff8000856e3a30\n[   48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130\n[   48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80\n[   48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000\n[   48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000\n[   48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618\n[   48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000\n[   48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028\n[   48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000\n[   48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000\n[   48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000\n[   48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt\n[   48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\n[   48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\n[   48.834556] Call trace:\n[   48.834559]  dump_backtrace+0x94/0xec\n[   48.834574]  show_stack+0x18/0x24\n[   48.834579]  dump_stack_lvl+0x38/0x90\n[   48.834585]  dump_stack+0x18/0x24\n[   48.834588]  panic+0x35c/0x3e0\n[   48.834592]  nmi_panic+0x40/0x8c\n[   48.834595]  arm64_serror_panic+0x64/0x70\n[   48.834598]  do_serror+0x3c/0x78\n[   48.834601]  el1h_64_error_handler+0x34/0x4c\n[   48.834605]  el1h_64_error+0x64/0x68\n[   48.834608]  wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\n[   48.834615]  wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5]\n[   48.834622]  wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5]\n[   48.834628]  __enqueue_in_driver+0x3c/0x74 [videobuf2_common]\n[   48.834639]  vb2_core_qbuf+0x508/0x61c [videobuf2_common]\n[   48.834646]  vb2_qbuf+0xa4/0x168 [videobuf2_v4l2]\n[   48.834656]  v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem]\n[   48.834666]  v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem]\n[   48.834673]  v4l_qbuf+0x48/0x5c [videodev]\n[   48.834704]  __video_do_ioctl+0x180/0x3f0 [videodev]\n[   48.834725]  video_usercopy+0x2ec/0x68c [videodev]\n[   48.834745]  video_ioctl2+0x18/0x24 [videodev]\n[   48.834766]  v4l2_ioctl+0x40/0x60 [videodev]\n[   48.834786]  __arm64_sys_ioctl+0xa8/0xec\n[   48.834793]  invoke_syscall+0x44/0x100\n[   48.834800]  el0_svc_common.constprop.0+0xc0/0xe0\n[   48.834804]  do_el0_svc+0x1c/0x28\n[   48.834809]  el0_svc+0x30/0xd0\n[   48.834813]  el0t_64_sync_handler+0xc0/0xc4\n[   48.834816]  el0t_64_sync+0x190/0x194\n[   48.834820] SMP: stopping secondary CPUs\n[   48.834831] Kernel Offset: disabled\n[   48.834833] CPU features: 0x08,00002002,80200000,4200421b\n[   48.834837] Memory Limit: none\n[   49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-06T11:28:38.902Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/27cb12b7dc88c51582094eeb2b65b0e94603e411"
        },
        {
          "url": "https://git.kernel.org/stable/c/5da55243fe190c2165ed34e77091a43c0ff74f10"
        },
        {
          "url": "https://git.kernel.org/stable/c/cbb9c0d50e471483cced55f5b7db4569dcd959a6"
        }
      ],
      "title": "media: chips-media: wave5: Fix SError of kernel panic when closed",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-43247",
    "datePublished": "2026-05-06T11:28:38.902Z",
    "dateReserved": "2026-05-01T14:12:55.996Z",
    "dateUpdated": "2026-05-06T11:28:38.902Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-43247\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:45.237\",\"lastModified\":\"2026-05-06T13:07:51.607\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: chips-media: wave5: Fix SError of kernel panic when closed\\n\\nSError of kernel panic rarely happened while testing fluster.\\nThe root cause was to enter suspend mode because timeout of autosuspend\\ndelay happened.\\n\\n[   48.834439] SError Interrupt on CPU0, code 0x00000000bf000000 -- SError\\n[   48.834455] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\\n[   48.834461] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\\n[   48.834464] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n[   48.834468] pc : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[   48.834488] lr : wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[   48.834495] sp : ffff8000856e3a30\\n[   48.834497] x29: ffff8000856e3a30 x28: ffff0008093f6010 x27: ffff000809158130\\n[   48.834504] x26: 0000000000000000 x25: ffff00080b625000 x24: ffff000804a9ba80\\n[   48.834509] x23: ffff000802343028 x22: ffff000809158150 x21: ffff000802218000\\n[   48.834513] x20: ffff0008093f6000 x19: ffff0008093f6000 x18: 0000000000000000\\n[   48.834518] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff74009618\\n[   48.834523] x14: 000000010000000c x13: 0000000000000000 x12: 0000000000000000\\n[   48.834527] x11: ffffffffffffffff x10: ffffffffffffffff x9 : ffff000802343028\\n[   48.834532] x8 : ffff00080b6252a0 x7 : 0000000000000038 x6 : 0000000000000000\\n[   48.834536] x5 : ffff00080b625060 x4 : 0000000000000000 x3 : 0000000000000000\\n[   48.834541] x2 : 0000000000000000 x1 : ffff800084bf0118 x0 : ffff800084bf0000\\n[   48.834547] Kernel panic - not syncing: Asynchronous SError Interrupt\\n[   48.834549] CPU: 0 UID: 0 PID: 1067 Comm: v4l2h265dec0:sr Not tainted 6.12.9-gc9e21a1ebd75-dirty #7\\n[   48.834554] Hardware name: ti Texas Instruments J721S2 EVM/Texas Instruments J721S2 EVM, BIOS 2025.01-00345-gbaf3aaa8ecfa 01/01/2025\\n[   48.834556] Call trace:\\n[   48.834559]  dump_backtrace+0x94/0xec\\n[   48.834574]  show_stack+0x18/0x24\\n[   48.834579]  dump_stack_lvl+0x38/0x90\\n[   48.834585]  dump_stack+0x18/0x24\\n[   48.834588]  panic+0x35c/0x3e0\\n[   48.834592]  nmi_panic+0x40/0x8c\\n[   48.834595]  arm64_serror_panic+0x64/0x70\\n[   48.834598]  do_serror+0x3c/0x78\\n[   48.834601]  el1h_64_error_handler+0x34/0x4c\\n[   48.834605]  el1h_64_error+0x64/0x68\\n[   48.834608]  wave5_dec_clr_disp_flag+0x40/0x80 [wave5]\\n[   48.834615]  wave5_vpu_dec_clr_disp_flag+0x54/0x80 [wave5]\\n[   48.834622]  wave5_vpu_dec_buf_queue+0x19c/0x1a0 [wave5]\\n[   48.834628]  __enqueue_in_driver+0x3c/0x74 [videobuf2_common]\\n[   48.834639]  vb2_core_qbuf+0x508/0x61c [videobuf2_common]\\n[   48.834646]  vb2_qbuf+0xa4/0x168 [videobuf2_v4l2]\\n[   48.834656]  v4l2_m2m_qbuf+0x80/0x238 [v4l2_mem2mem]\\n[   48.834666]  v4l2_m2m_ioctl_qbuf+0x18/0x24 [v4l2_mem2mem]\\n[   48.834673]  v4l_qbuf+0x48/0x5c [videodev]\\n[   48.834704]  __video_do_ioctl+0x180/0x3f0 [videodev]\\n[   48.834725]  video_usercopy+0x2ec/0x68c [videodev]\\n[   48.834745]  video_ioctl2+0x18/0x24 [videodev]\\n[   48.834766]  v4l2_ioctl+0x40/0x60 [videodev]\\n[   48.834786]  __arm64_sys_ioctl+0xa8/0xec\\n[   48.834793]  invoke_syscall+0x44/0x100\\n[   48.834800]  el0_svc_common.constprop.0+0xc0/0xe0\\n[   48.834804]  do_el0_svc+0x1c/0x28\\n[   48.834809]  el0_svc+0x30/0xd0\\n[   48.834813]  el0t_64_sync_handler+0xc0/0xc4\\n[   48.834816]  el0t_64_sync+0x190/0x194\\n[   48.834820] SMP: stopping secondary CPUs\\n[   48.834831] Kernel Offset: disabled\\n[   48.834833] CPU features: 0x08,00002002,80200000,4200421b\\n[   48.834837] Memory Limit: none\\n[   49.161404] ---[ end Kernel panic - not syncing: Asynchronous SError Interrupt ]---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/27cb12b7dc88c51582094eeb2b65b0e94603e411\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5da55243fe190c2165ed34e77091a43c0ff74f10\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cbb9c0d50e471483cced55f5b7db4569dcd959a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…