CVE-2026-23149 PUBLISHED CVSS 5.5 MEDIUM

In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idr_alloc() which uses int ranges, passing a new handle larger than INT_MAX trivially triggers a kernel warning: idr_alloc(): ... if (WARN_ON_ONCE(start < 0)) return -EINVAL; ... Fix it by rejecting new handles above INT_MAX and at the same time make the end limit calculation more obvious by moving into int domain.

EPSS 0.02% · 3.9th percentile

Risk Scores

CVSS v3.1
5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS Score
0.02%
3.9th percentile

Affected Products

VendorProductVersions
LinuxLinux53096728b8910c6916ecc6c46a5abc5c678b58d9, 53096728b8910c6916ecc6c46a5abc5c678b58d9, 6.18
linuxlinux_kernel6.18, 6.19, 6.19

Timeline

References

Open in Interactive Console →