In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 The type of size is unsigned int, if size is 0x40000000, there will be an integer overflow, size will be zero after size *= sizeof(uint32_t), will cause uninitialized memory to be referenced later.
https://git.kernel.org/stable/c/c3deb091398e9e469d08dd1599b6d76fd6b29df8
https://git.kernel.org/stable/c/9f55d300541cb5b435984d269087810581580b00
https://git.kernel.org/stable/c/87c2213e85bd81e4a9a4d0880c256568794ae388