CVE-2025-68802

Source
https://cve.org/CVERecord?id=CVE-2025-68802
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68802.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68802
Downstream
Related
Published
2026-01-13T15:29:11.079Z
Modified
2026-03-20T12:46:29.399697Z
Summary
drm/xe: Limit num_syncs to prevent oversized allocations
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Limit num_syncs to prevent oversized allocations

The exec and vmbind ioctl allow userspace to specify an arbitrary numsyncs value. Without bounds checking, a very large num_syncs can force an excessively large allocation, leading to kernel warnings from the page allocator as below.

Introduce DRMXEMAX_SYNCS (set to 1024) and reject any request exceeding this limit.

" ------------[ cut here ]------------ WARNING: CPU: 0 PID: 1217 at mm/page_alloc.c:5124 __allocfrozenpagesnoprof+0x2f8/0x2180 mm/pagealloc.c:5124 ... Call Trace: <TASK> allocpagesmpol+0xe4/0x330 mm/mempolicy.c:2416 ___kmalloclargenode+0xd8/0x110 mm/slub.c:4317 __kmalloclargenode_noprof+0x18/0xe0 mm/slub.c:4348 __dokmallocnode mm/slub.c:4364 [inline] __kmallocnoprof+0x3d4/0x4b0 mm/slub.c:4388 kmallocnoprof include/linux/slab.h:909 [inline] kmallocarraynoprof include/linux/slab.h:948 [inline] xeexecioctl+0xa47/0x1e70 drivers/gpu/drm/xe/xeexec.c:158 drmioctlkernel+0x1f1/0x3e0 drivers/gpu/drm/drmioctl.c:797 drmioctl+0x5e7/0xc50 drivers/gpu/drm/drmioctl.c:894 xedrmioctl+0x10b/0x170 drivers/gpu/drm/xe/xedevice.c:224 vfsioctl fs/ioctl.c:51 [inline] __dosysioctl fs/ioctl.c:598 [inline] __sesysioctl fs/ioctl.c:584 [inline] __x64sysioctl+0x18b/0x210 fs/ioctl.c:584 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xbb/0x380 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f ... "

v2: Add "Reported-by" and Cc stable kernels. v3: Change XEMAXSYNCS from 64 to 1024. (Matt & Ashutosh) v4: s/XEMAXSYNCS/DRMXEMAX_SYNCS/ (Matt) v5: Do the check at the top of the exec func. (Matt)

(cherry picked from commit b07bac9bd708ec468cd1b8a5fe70ae2ac9b0a11c)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68802.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd08ebf6c3525a7ea2186e636df064ea47281987
Fixed
e281d1fd6903a081ef023c341145ae92258e38d2
Fixed
1d200017f55f829b9e376093bd31dfbec92081de
Fixed
8e461304009135270e9ccf2d7e2dfe29daec9b60

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68802.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68802.json"