Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, chain fence, or user fence) before hitting a later failure path. Several of those paths returned directly, leaving partially initialized state and leaking refs. Route these error paths through a common free_sync label and call xe_sync_entry_cleanup(sync) before returning the error. (cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.8, < 6.12.78 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/1bfd7575092420ba5a0b944953c95b74a5646ff8Patch
- https://git.kernel.org/stable/c/91c228f96fcfacc2341a58815b1da8c69da94ebbPatch
- https://git.kernel.org/stable/c/af65cd1853599394b94201c08bed7a46717db478Patch
- https://git.kernel.org/stable/c/f0af63ffa06306f12592cd3919fad6957b425e1bPatch
FAQ
What is CVE-2026-43395?
CVE-2026-43395 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: drm/xe/sync: Cleanup partially initialized sync on parse failure xe_sync_entry_parse() can allocate references (syncobj, fence, ch...
How severe is CVE-2026-43395?
CVE-2026-43395 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43395?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.