CVE-2025-71076

medium

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Limit num_syncs to prevent oversized allocations The OA open parameters did not validate num_syncs, allowing userspace to pass arbitrarily large values, potentially leading to excessive allocations. Add check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS, returning -EINVAL when the limit is violated. v2: use XE_IOCTL_DBG() and drop duplicated check. (Ashutosh) (cherry picked from commit e057b2d2b8d815df3858a87dffafa2af37e5945b)

References

https://git.kernel.org/stable/c/f8dd66bfb4e184c71bd26418a00546ebe7f5c17a

https://git.kernel.org/stable/c/b963636331fb4f3f598d80492e2fa834757198eb

https://git.kernel.org/stable/c/338849090ee610ff6d11e5e90857d2c27a4121ab

Details

Source: Mitre, NVD

Published: 2026-01-13

Updated: 2026-01-14

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00017