In the Linux kernel, the following vulnerability has been resolved:
drm/xe/ufence: Prefetch ufence addr to catch bogus address
access_ok() only checks for addr overflow so also try to read the addr to catch invalid addr sent from userspace.
(cherry picked from commit 9408c4508483ffc60811e910a93d6425b8e63928)
[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1813b3253480b30604c680026c7dc721ce86d1",
        "target": {
            "function": "user_fence_create",
            "file": "drivers/gpu/drm/xe/xe_sync.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2024-53098-1be95d3b",
        "signature_type": "Function",
        "digest": {
            "length": 459.0,
            "function_hash": "330822138396856597137031537693242117558"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1813b3253480b30604c680026c7dc721ce86d1",
        "target": {
            "file": "drivers/gpu/drm/xe/xe_sync.c"
        },
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2024-53098-b3fa7713",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "306512168930597221599542370710383293269",
                "20452213982111056549273591458566407761",
                "302578726376060497353361596269161314789",
                "99613774914549781507307469816985917670",
                "157843895702302773897460089007477995682"
            ]
        }
    }
]