{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43395","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:56.007Z","datePublished":"2026-05-08T14:21:38.756Z","dateUpdated":"2026-05-11T22:23:45.325Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:23:45.325Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/sync: Cleanup partially initialized sync on parse failure\n\nxe_sync_entry_parse() can allocate references (syncobj, fence, chain fence,\nor user fence) before hitting a later failure path. Several of those paths\nreturned directly, leaving partially initialized state and leaking refs.\n\nRoute these error paths through a common free_sync label and call\nxe_sync_entry_cleanup(sync) before returning the error.\n\n(cherry picked from commit f939bdd9207a5d1fc55cced5459858480686ce22)"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/xe/xe_sync.c"],"versions":[{"version":"dd08ebf6c3525a7ea2186e636df064ea47281987","lessThan":"91c228f96fcfacc2341a58815b1da8c69da94ebb","status":"affected","versionType":"git"},{"version":"dd08ebf6c3525a7ea2186e636df064ea47281987","lessThan":"af65cd1853599394b94201c08bed7a46717db478","status":"affected","versionType":"git"},{"version":"dd08ebf6c3525a7ea2186e636df064ea47281987","lessThan":"f0af63ffa06306f12592cd3919fad6957b425e1b","status":"affected","versionType":"git"},{"version":"dd08ebf6c3525a7ea2186e636df064ea47281987","lessThan":"1bfd7575092420ba5a0b944953c95b74a5646ff8","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/gpu/drm/xe/xe_sync.c"],"versions":[{"version":"6.8","status":"affected"},{"version":"0","lessThan":"6.8","status":"unaffected","versionType":"semver"},{"version":"6.12.78","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.19","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.9","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.12.78"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.18.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.19.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"7.0"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/91c228f96fcfacc2341a58815b1da8c69da94ebb"},{"url":"https://git.kernel.org/stable/c/af65cd1853599394b94201c08bed7a46717db478"},{"url":"https://git.kernel.org/stable/c/f0af63ffa06306f12592cd3919fad6957b425e1b"},{"url":"https://git.kernel.org/stable/c/1bfd7575092420ba5a0b944953c95b74a5646ff8"}],"title":"drm/xe/sync: Cleanup partially initialized sync on parse failure","x_generator":{"engine":"bippy-1.2.0"}}}}