In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Prevent out of bounds access in performance query extensions Check that the number of perfmons userspace is passing in the copy and reset extensions is not greater than the internal kernel storage where the ids will be copied into.
https://git.kernel.org/stable/c/f32b5128d2c440368b5bf3a7a356823e235caabb
https://git.kernel.org/stable/c/d9536f16be3970c170571efa707c13cd089c774e
https://git.kernel.org/stable/c/73ad583bd4938bf37d2709fc36901eb6f22f2722
https://git.kernel.org/stable/c/3e50d72abe50204c7b19784a66e86da29dde32c2