PatchSiren cyber security CVE debrief
CVE-2026-43247 Linux CVE debrief
CVE-2026-43247 affects the Linux kernel’s chips-media wave5 media driver and can lead to an asynchronous SError and kernel panic. The issue was observed while testing fluster, where an autosuspend delay timeout could cause the device to enter suspend mode at the wrong time. NVD rates the issue as CVSS 5.5/Medium, with local attack conditions and high availability impact. Patched kernel references are provided in the official stable git links.
- Vendor
- Linux
- Product
- CVE-2026-43247
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-06
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-06
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distribution security teams, and operators of embedded or appliance systems that use the chips-media wave5 decoder driver, especially where V4L2/media decode workloads are active. Systems running affected kernel versions in the NVD range should be prioritized for review.
Technical summary
The supplied kernel description says the wave5 driver could hit a rare SError kernel panic during queueing/clear-display-flag operations when an autosuspend delay expired and the device entered suspend mode unexpectedly. The crash trace shows the fault in wave5_dec_clr_disp_flag() and propagates through the V4L2 queueing path into a full kernel panic. NVD marks the issue as affecting Linux kernel versions 6.13 up to, but not including, 6.18.16, and 6.19 up to, but not including, 6.19.6. Official stable kernel patch references are listed in the source corpus.
Defensive priority
Medium
Recommended defensive actions
- Upgrade to a Linux kernel release that includes the official fixes referenced in the stable git links.
- If you maintain downstream kernels, backport the wave5 fixes into your supported branches.
- Review whether your systems use the chips-media wave5 media driver and whether autosuspend is enabled for the affected hardware path.
- Test media decode and suspend/resume behavior after patching to confirm the panic no longer reproduces.
- Monitor for kernel logs showing asynchronous SError, wave5_dec_clr_disp_flag, or autosuspend-related timing issues.
Evidence notes
Evidence comes from the CVE description and NVD metadata in the supplied corpus. The description explicitly states that the root cause was entering suspend mode because an autosuspend delay timed out, and it includes a panic trace pointing to wave5_dec_clr_disp_flag(). NVD lists the vulnerability as analyzed, provides the affected Linux kernel version ranges, and links three official kernel.org stable patch references.
Official resources
-
CVE-2026-43247 CVE record
CVE.org
-
CVE-2026-43247 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
CVE published 2026-05-06T12:16:45.237Z and last modified 2026-05-11T13:28:31.730Z, per the supplied CVE and timeline fields. The source item was published and modified on the same dates.