In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Prevent out of bounds access in performance query extensions Check that the number of perfmons userspace is passing in the copy and reset extensions is not greater than the internal kernel storage where the ids will be copied into. (cherry picked from commit f32b5128d2c440368b5bf3a7a356823e235caabb)
https://git.kernel.org/stable/c/73ad583bd4938bf37d2709fc36901eb6f22f2722
https://git.kernel.org/stable/c/6ce9efd12ae81cf46bf44eb0348594558dfbb9d2