Impact
The vulnerability exists in the Linux kernel DRM Xe sync subsystem. The function xe_sync_entry_parse() may allocate kernel objects such as syncobj, fence, chain fence, or a user fence before a failure path is hit. Several of those paths return directly, leaving the allocated references live. This results in a leaking of kernel resources that are never released, which can lead to gradual depletion of memory or other critical kernel bookkeeping structures and ultimately cause a denial‑of‑service condition.
Affected Systems
All Linux kernel releases that do not yet contain commit f939bdd9207a5d1fc55cced5459858480686ce22. The affected component is the DRM Xe sync subsystem, which is part of the vanilla Linux kernel. Users running any active kernel prior to that commit are at risk until the distribution provides an updated kernel image.
Risk and Exploitability
EPSS data is not available and the vulnerability is not listed in CISA KEV. The flaw is a resource‑leak type; exploitation requires triggering the parse routine, typically via ordinary DRM operations and does not require elevated privileges. The likely attack vector is local or any software that can invoke drm/xe sync processing. The potential for a denial‑of‑service condition exists if an attacker can repeatedly induce parse failures to accumulate leaked references. While widespread exploitation is not currently documented, the risk is moderate due to the possibility of a gradual resource exhaustion. The CVSS score is 5.5, indicating moderate severity.
OpenCVE Enrichment