Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a possible buffer overflow if size is larger than 4K. (cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434).
References
https://git.kernel.org/stable/c/673bdb4200c092692f83b5f7ba3df57021d52d29
https://git.kernel.org/stable/c/7ccd781794d247589104a791caab491e21218fba
https://git.kernel.org/stable/c/17f5f18085acb5e9d8d13d84a4e12bb3aff2bd64
https://git.kernel.org/stable/c/aaf6160a4b7f9ee3cd91aa5b3251f5dbe2170f42
https://git.kernel.org/stable/c/25d7e84343e1235b667cf5226c3934fdf36f0df6
https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7a
https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51f
https://git.kernel.org/stable/c/4d75b9468021c73108b4439794d69e892b1d24e3