drm/xe/sync: Cleanup partially initialized sync on parse failure
Summary
| CVE | CVE-2026-43395 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 15:16:50 UTC |
| Updated | 2026-05-08 15:16:50 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence, or user fence) before hitting a later failure path. Several of those paths returned directly, leaving partially initialized state and leaking refs. Route these error paths through a common free_sync label and call xe_sync_entry_cleanup(sync) before returning the error. (cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22) |
Risk And Classification
EPSS: 0.000180000 probability, percentile 0.047280000 (date 2026-05-11)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected dd08ebf6c3525a7ea2186e636df064ea47281987 91c228f96fcfacc2341a58815b1da8c69da94ebb git | Not specified |
| CNA | Linux | Linux | affected dd08ebf6c3525a7ea2186e636df064ea47281987 af65cd1853599394b94201c08bed7a46717db478 git | Not specified |
| CNA | Linux | Linux | affected dd08ebf6c3525a7ea2186e636df064ea47281987 f0af63ffa06306f12592cd3919fad6957b425e1b git | Not specified |
| CNA | Linux | Linux | affected dd08ebf6c3525a7ea2186e636df064ea47281987 1bfd7575092420ba5a0b944953c95b74a5646ff8 git | Not specified |
| CNA | Linux | Linux | affected 6.8 | Not specified |
| CNA | Linux | Linux | unaffected 6.8 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.19 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.9 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/f0af63ffa06306f12592cd3919fad6957b425e1b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/91c228f96fcfacc2341a58815b1da8c69da94ebb | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/1bfd7575092420ba5a0b944953c95b74a5646ff8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/af65cd1853599394b94201c08bed7a46717db478 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.