Description
In the Linux kernel, the following vulnerability has been resolved:

drm/xe/sync: Cleanup partially initialized sync on parse failure

xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence,
or user fence) before hitting a later failure path. Several of those paths
returned directly, leaving partially initialized state and leaking refs.

Route these error paths through a common free_sync label and call
xe_sync_entry_cleanup(sync) before returning the error.

(cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22)
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the Linux kernel DRM Xe sync subsystem. The function xe_sync_entry_parse() may allocate kernel objects such as syncobj, fence, chain fence, or a user fence before a failure path is hit. Several of those paths return directly, leaving the allocated references live. This results in a leaking of kernel resources that are never released, which can lead to gradual depletion of memory or other critical kernel bookkeeping structures and ultimately cause a denial‑of‑service condition.

Affected Systems

All Linux kernel releases that do not yet contain commit f939bdd9207a5d1fc55cced5459858480686ce22. The affected component is the DRM Xe sync subsystem, which is part of the vanilla Linux kernel. Users running any active kernel prior to that commit are at risk until the distribution provides an updated kernel image.

Risk and Exploitability

EPSS data is not available and the vulnerability is not listed in CISA KEV. The flaw is a resource‑leak type; exploitation requires triggering the parse routine, typically via ordinary DRM operations and does not require elevated privileges. The likely attack vector is local or any software that can invoke drm/xe sync processing. The potential for a denial‑of‑service condition exists if an attacker can repeatedly induce parse failures to accumulate leaked references. While widespread exploitation is not currently documented, the risk is moderate due to the possibility of a gradual resource exhaustion. The CVSS score is 5.5, indicating moderate severity.

Generated by OpenCVE AI on May 9, 2026 at 03:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the running kernel to a version that contains commit f939bdd9207a5d1fc55cced5459858480686ce22 or later.
  • If the distribution does not provide an updated kernel, rebuild the kernel locally with the patch applied and install the patched image.
  • Disable or restrict any privileged applications that invoke DRM Xe sync operations until the kernel is updated, thereby preventing the token from triggering the vulnerable parsing routine.

Generated by OpenCVE AI on May 9, 2026 at 03:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-754

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-459
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-754

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence, or user fence) before hitting a later failure path. Several of those paths returned directly, leaving partially initialized state and leaking refs. Route these error paths through a common free_sync label and call xe_sync_entry_cleanup(sync) before returning the error. (cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22)
Title drm/xe/sync: Cleanup partially initialized sync on parse failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:38.756Z

Reserved: 2026-05-01T14:12:56.007Z

Link: CVE-2026-43395

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:50.907

Modified: 2026-05-08T15:16:50.907

Link: CVE-2026-43395

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43395 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:00:14Z

Weaknesses