CVE-2026-43247
Kernel panic SError in ChipsMedia WAVE5 driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ti | wave5 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel, specifically in the media component for the chips-media wave5 driver. It causes a rare kernel panic triggered by an SError interrupt when the system enters suspend mode due to a timeout of the autosuspend delay. The panic occurs asynchronously and is linked to the wave5 video decoding process, causing the kernel to stop functioning properly.
How can this vulnerability impact me? :
The impact of this vulnerability is a kernel panic, which leads to the system crashing and becoming unresponsive. This can cause loss of unsaved data, disruption of services, and require a system reboot to recover. It affects systems using the wave5 media driver on certain Texas Instruments hardware platforms.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as an SError kernel panic related to the wave5 media driver in the Linux kernel. Detection involves monitoring system logs for specific kernel panic messages.
- Check the kernel log for SError Interrupt messages and kernel panic related to wave5, for example using: dmesg | grep -i 'SError Interrupt'
- Look for kernel panic messages mentioning 'Asynchronous SError Interrupt' and the wave5 driver, for example: dmesg | grep -i 'kernel panic'
- Monitor system logs (e.g., /var/log/kern.log or journalctl) for entries similar to the provided stack trace involving wave5 and v4l2h265dec0 processes.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in the Linux kernel by correcting the handling of SError panics in the wave5 media driver. Immediate mitigation steps include updating the Linux kernel to a version that contains this fix.
- Update the Linux kernel to version 6.12.9 or later where the fix is applied.
- Avoid using the wave5 media driver or disable the related hardware if updating the kernel is not immediately possible.
- Monitor system stability and logs for any recurrence of SError panics until the update can be applied.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not include any details about the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.