CVE-2026-43395

high

Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence, or user fence) before hitting a later failure path. Several of those paths returned directly, leaving partially initialized state and leaking refs. Route these error paths through a common free_sync label and call xe_sync_entry_cleanup(sync) before returning the error. (cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22)

References

https://git.kernel.org/stable/c/f0af63ffa06306f12592cd3919fad6957b425e1b

https://git.kernel.org/stable/c/af65cd1853599394b94201c08bed7a46717db478

https://git.kernel.org/stable/c/91c228f96fcfacc2341a58815b1da8c69da94ebb

https://git.kernel.org/stable/c/1bfd7575092420ba5a0b944953c95b74a5646ff8

Details

Source: Mitre, NVD

Published: 2026-05-08

Updated: 2026-05-08

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High