In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drmgemchangehandleioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idralloc() which uses int ranges, passing a new handle larger than INTMAX trivially triggers a kernel warning: idralloc(): ... if (WARNONONCE(start < 0)) return -EINVAL; ... Fix it by rejecting new handles above INTMAX and at the same time make the end limit calculation more obvious by moving into int domain.