Description
In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idr_alloc() which uses int ranges, passing a new handle larger than INT_MAX trivially triggers a kernel warning: idr_alloc(): ... if (WARN_ON_ONCE(start < 0)) return -EINVAL; ... Fix it by rejecting new handles above INT_MAX and at the same time make the end limit calculation more obvious by moving into int domain.
Product status
53096728b8910c6916ecc6c46a5abc5c678b58d9 (git) before ae8831ee0fb2f5f41f39722e7b3749d65bb78d08
53096728b8910c6916ecc6c46a5abc5c678b58d9 (git) before 12f15d52d38ac53f7c70ea3d4b3d76afed04e064
6.18
Any version before 6.18
6.18.9 (semver)
6.19 (original_commit_for_fix)
References
git.kernel.org/...c/ae8831ee0fb2f5f41f39722e7b3749d65bb78d08
git.kernel.org/...c/12f15d52d38ac53f7c70ea3d4b3d76afed04e064