๐Ÿ” CVE Alert

CVE-2026-43293

UNKNOWN 0.0

media: chips-media: wave5: Fix kthread worker destruction in polling mode

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: chips-media: wave5: Fix kthread worker destruction in polling mode Fix the cleanup order in polling mode (irq < 0) to prevent kernel warnings during module removal. Cancel the hrtimer before destroying the kthread worker to ensure work queues are empty. In polling mode, the driver uses hrtimer to periodically trigger wave5_vpu_timer_callback() which queues work via kthread_queue_work(). The kthread_destroy_worker() function validates that both work queues are empty with WARN_ON(!list_empty(&worker->work_list)) and WARN_ON(!list_empty(&worker->delayed_work_list)). The original code called kthread_destroy_worker() before hrtimer_cancel(), creating a race condition where the timer could fire during worker destruction and queue new work, triggering the WARN_ON. This causes the following warning on every module unload in polling mode: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 1034 at kernel/kthread.c:1430 kthread_destroy_worker+0x84/0x98 Modules linked in: wave5(-) rpmsg_ctrl rpmsg_char ... Call trace: kthread_destroy_worker+0x84/0x98 wave5_vpu_remove+0xc8/0xe0 [wave5] platform_remove+0x30/0x58 ... ---[ end trace 0000000000000000 ]---

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ed7276ed2fd02208bfca9f222ef1e7b2743d710d < 156020e889edf4593870d926d3c4a6d06baac44a ed7276ed2fd02208bfca9f222ef1e7b2743d710d < cc8071b1bac6568ea09d54be2d4f74dba80e17f8 ed7276ed2fd02208bfca9f222ef1e7b2743d710d < 0c2e752688a0ee3b89993e6de6c496d863870c93 ed7276ed2fd02208bfca9f222ef1e7b2743d710d < 5a0c122e834b2f7f029526422c71be922960bf03
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/156020e889edf4593870d926d3c4a6d06baac44a git.kernel.org: https://git.kernel.org/stable/c/cc8071b1bac6568ea09d54be2d4f74dba80e17f8 git.kernel.org: https://git.kernel.org/stable/c/0c2e752688a0ee3b89993e6de6c496d863870c93 git.kernel.org: https://git.kernel.org/stable/c/5a0c122e834b2f7f029526422c71be922960bf03