Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idr_alloc() which uses int ranges, passing a new handle larger than INT_MAX trivially triggers a kernel warning: idr_alloc(): ... if (WARN_ON_ONCE(start < 0)) return -EINVAL; ... Fix it by rejecting new handles above INT_MAX and at the same time make the end limit calculation more obvious by moving into int domain.

PUBLISHED Reserved 2026-01-13 | Published 2026-02-14 | Updated 2026-02-14 | Assigner Linux

Product status

Default status
unaffected

53096728b8910c6916ecc6c46a5abc5c678b58d9 (git) before ae8831ee0fb2f5f41f39722e7b3749d65bb78d08
affected

53096728b8910c6916ecc6c46a5abc5c678b58d9 (git) before 12f15d52d38ac53f7c70ea3d4b3d76afed04e064
affected

Default status
affected

6.18
affected

Any version before 6.18
unaffected

6.18.9 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ae8831ee0fb2f5f41f39722e7b3749d65bb78d08

git.kernel.org/...c/12f15d52d38ac53f7c70ea3d4b3d76afed04e064

cve.org (CVE-2026-23149)

nvd.nist.gov (CVE-2026-23149)

Download JSON