| 1786013 | Packaging resync | 
                
                | 2086606 | Add list of source files to linux-buildinfo | 
                
                | 2093146 | KVM: Cache CPUID at KVM.ko module init to reduce latency of VM-Enter and VM-Exit | 
                
                | 2089541 | Jammy update: v5.15.173 upstream stable release | 
                
                | 2089533 | Jammy update: v5.15.172 upstream stable release | 
                
                | 2089405 | Jammy update: v5.15.171 upstream stable release | 
                
                | 2089272 | Jammy update: v5.15.170 upstream stable release | 
                
                | 2089699 | kernel:nft \ | 
                
                | 2089373 | WARN in trc_wait_for_one_reader about failed IPIs | 
                
                | 2087853 | UFS: uspi-\u003es_3apb UBSAN: shift-out-of-bounds | 
                
                | 2088231 | Jammy update: v5.15.169 upstream stable release | 
                
                | CVE-2024-41080 | In the Linux kernel, the following vulnerability has been resolved:  io_uring: fix possible deadlock in io_register_iowq_max_workers()  The io_regist | 
                
                | CVE-2024-50265 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()  S | 
                
                | CVE-2024-50267 | In the Linux kernel, the following vulnerability has been resolved:  USB: serial: io_edgeport: fix use after free in debug printk  The "dev_dbg(&urb- | 
                
                | CVE-2024-50268 | In the Linux kernel, the following vulnerability has been resolved:  usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()  Th | 
                
                | CVE-2024-50269 | In the Linux kernel, the following vulnerability has been resolved:  usb: musb: sunxi: Fix accessing an released usb phy  Commit 6ed05c68cbca ("usb: | 
                
                | CVE-2024-50036 | In the Linux kernel, the following vulnerability has been resolved:  net: do not delay dst_entries_add() in dst_release()  dst_entries_add() uses per | 
                
                | CVE-2024-42291 | In the Linux kernel, the following vulnerability has been resolved:  ice: Add a per-VF limit on number of FDIR filters  While the iavf driver adds a | 
                
                | CVE-2024-50273 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: reinitialize delayed ref list after deleting it from the list  At insert_ | 
                
                | CVE-2024-53066 | In the Linux kernel, the following vulnerability has been resolved:  nfs: Fix KMSAN warning in decode_getfattr_attrs()  Fix the following KMSAN warni | 
                
                | CVE-2024-53052 | In the Linux kernel, the following vulnerability has been resolved:  io_uring/rw: fix missing NOWAIT check for O_DIRECT start write  When io_uring st | 
                
                | CVE-2024-50278 | In the Linux kernel, the following vulnerability has been resolved:  dm cache: fix potential out-of-bounds access on the first resume  Out-of-bounds | 
                
                | CVE-2024-50279 | In the Linux kernel, the following vulnerability has been resolved:  dm cache: fix out-of-bounds access to the dirty bitset when resizing  dm-cache c | 
                
                | CVE-2024-50282 | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()  Avoid a pos | 
                
                | CVE-2024-50287 | In the Linux kernel, the following vulnerability has been resolved:  media: v4l2-tpg: prevent the risk of a division by zero  As reported by Coverity | 
                
                | CVE-2024-50290 | In the Linux kernel, the following vulnerability has been resolved:  media: cx24116: prevent overflows on SNR calculus  as reported by Coverity, if r | 
                
                | CVE-2024-53061 | In the Linux kernel, the following vulnerability has been resolved:  media: s5p-jpeg: prevent buffer overflows  The current logic allows word to be l | 
                
                | CVE-2024-50292 | In the Linux kernel, the following vulnerability has been resolved:  ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove  In case o | 
                
                | CVE-2024-53063 | In the Linux kernel, the following vulnerability has been resolved:  media: dvbdev: prevent the risk of out of memory access  The dvbdev contains a s | 
                
                | CVE-2024-50295 | In the Linux kernel, the following vulnerability has been resolved:  net: arc: fix the device for dma_map_single/dma_unmap_single  The ndev->dev and | 
                
                | CVE-2024-50296 | In the Linux kernel, the following vulnerability has been resolved:  net: hns3: fix kernel crash when uninstalling driver  When the driver is uninsta | 
                
                | CVE-2024-53088 | In the Linux kernel, the following vulnerability has been resolved:  i40e: fix race condition by adding filter's intermediate sync state  Fix a race | 
                
                | CVE-2024-50299 | In the Linux kernel, the following vulnerability has been resolved:  sctp: properly validate chunk size in sctp_sf_ootb()  A size validation fix simi | 
                
                | CVE-2024-50301 | In the Linux kernel, the following vulnerability has been resolved:  security/keys: fix slab-out-of-bounds in key_task_permission  KASAN reports an o | 
                
                | CVE-2024-50302 | In the Linux kernel, the following vulnerability has been resolved:  HID: core: zero-initialize the report buffer  Since the report buffer is used by | 
                
                | CVE-2023-52913 | In the Linux kernel, the following vulnerability has been resolved:  drm/i915: Fix potential context UAFs  gem_context_register() makes the context v | 
                
                | CVE-2024-53055 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: fix 6 GHz scan construction  If more than 255 colocated APs | 
                
                | CVE-2024-50230 | In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix kernel bug due to missing clearing of checked flag  Syzbot reported | 
                
                | CVE-2024-50072 | In the Linux kernel, the following vulnerability has been resolved:  x86/bugs: Use code segment selector for VERW operand  Robert Gill reported below | 
                
                | CVE-2024-50218 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow  Syzbot reported a kerne | 
                
                | CVE-2024-50229 | In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix potential deadlock with newly created symlinks  Syzbot reported that | 
                
                | CVE-2024-50232 | In the Linux kernel, the following vulnerability has been resolved:  iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()  In the ad712 | 
                
                | CVE-2024-50233 | In the Linux kernel, the following vulnerability has been resolved:  staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() | 
                
                | CVE-2024-50234 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlegacy: Clear stale interrupts before resuming device  iwl4965 fails upo | 
                
                | CVE-2024-50236 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath10k: Fix memory leak in management tx  In the current logic, memory is | 
                
                | CVE-2024-50237 | In the Linux kernel, the following vulnerability has been resolved:  wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower  Avoid p | 
                
                | CVE-2024-50244 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Additional check in ni_clear()  Checking of NTFS_FLAGS_LOG_REPLAYING a | 
                
                | CVE-2024-50245 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Fix possible deadlock in mi_read  Mutex lock with another subclass use | 
                
                | CVE-2024-50247 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Check if more than chunk-size bytes are written  A incorrectly formatt | 
                
                | CVE-2024-50249 | In the Linux kernel, the following vulnerability has been resolved:  ACPI: CPPC: Make rmw_lock a raw_spin_lock  The following BUG was triggered:  === | 
                
                | CVE-2024-50251 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_payload: sanitize offset and length before calling skb_checksum() | 
                
                | CVE-2024-50257 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: Fix use-after-free in get_info()  ip6table_nat module unload has refc | 
                
                | CVE-2024-50262 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Fix out-of-bounds write in trie_get_next_key()  trie_get_next_key() allocat | 
                
                | CVE-2024-50259 | In the Linux kernel, the following vulnerability has been resolved:  netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_acti | 
                
                | CVE-2024-53042 | In the Linux kernel, the following vulnerability has been resolved:  ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()  Ther | 
                
                | CVE-2024-53058 | In the Linux kernel, the following vulnerability has been resolved:  net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data  In case t | 
                
                | CVE-2024-53059 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()  1. The | 
                
                | CVE-2024-50141 | In the Linux kernel, the following vulnerability has been resolved:  ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context  PRMT needs | 
                
                | CVE-2024-50086 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix user-after-free from session log off  There is racy issue between smb | 
                
                | CVE-2024-50142 | In the Linux kernel, the following vulnerability has been resolved:  xfrm: validate new SA's prefixlen using SA family when sel.family is unset  This | 
                
                | CVE-2024-50103 | In the Linux kernel, the following vulnerability has been resolved:  ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()  A devm | 
                
                | CVE-2024-50058 | In the Linux kernel, the following vulnerability has been resolved:  serial: protect uart_port_dtr_rts() in uart_shutdown() too  Commit af224ca2df29 | 
                
                | CVE-2024-50110 | In the Linux kernel, the following vulnerability has been resolved:  xfrm: fix one more kernel-infoleak in algo dumping  During fuzz testing, the fol | 
                
                | CVE-2024-50115 | In the Linux kernel, the following vulnerability has been resolved:  KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory  Ignore nCR3[4:0] wh | 
                
                | CVE-2024-50116 | In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix kernel bug due to missing clearing of buffer delay flag  Syzbot repo | 
                
                | CVE-2024-50117 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd: Guard against bad data for ATIF ACPI method  If a BIOS provides bad dat | 
                
                | CVE-2024-50205 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()  The st | 
                
                | CVE-2024-50127 | In the Linux kernel, the following vulnerability has been resolved:  net: sched: fix use-after-free in taprio_change()  In 'taprio_change()', 'admin' | 
                
                | CVE-2024-50128 | In the Linux kernel, the following vulnerability has been resolved:  net: wwan: fix global oob in wwan_rtnl_policy  The variable wwan_rtnl_link_ops a | 
                
                | CVE-2024-50167 | In the Linux kernel, the following vulnerability has been resolved:  be2net: fix potential memory leak in be_xmit()  The be_xmit() returns NETDEV_TX_ | 
                
                | CVE-2024-50168 | In the Linux kernel, the following vulnerability has been resolved:  net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()  The sun3_ | 
                
                | CVE-2024-50131 | In the Linux kernel, the following vulnerability has been resolved:  tracing: Consider the NULL character when validating the event length  strlen() | 
                
                | CVE-2024-50143 | In the Linux kernel, the following vulnerability has been resolved:  udf: fix uninit-value use in udf_get_fileshortad  Check for overflow when comput | 
                
                | CVE-2024-50134 | In the Linux kernel, the following vulnerability has been resolved:  drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA | 
                
                | CVE-2024-50010 | In the Linux kernel, the following vulnerability has been resolved:  exec: don't WARN for racy path_noexec check  Both i_mode and noexec checks wrapp | 
                
                | CVE-2024-50194 | In the Linux kernel, the following vulnerability has been resolved:  arm64: probes: Fix uprobes for big-endian kernels  The arm64 uprobes code is bro | 
                
                | CVE-2024-50148 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: bnep: fix wild-memory-access in proto_unregister  There's issue as fo | 
                
                | CVE-2024-50150 | In the Linux kernel, the following vulnerability has been resolved:  usb: typec: altmode should keep reference to parent  The altmode device release | 
                
                | CVE-2024-50151 | In the Linux kernel, the following vulnerability has been resolved:  smb: client: fix OOBs when building SMB2_IOCTL request  When using encryption, e | 
                
                | CVE-2024-50153 | In the Linux kernel, the following vulnerability has been resolved:  scsi: target: core: Fix null-ptr-deref in target_alloc_device()  There is a null | 
                
                | CVE-2024-50154 | In the Linux kernel, the following vulnerability has been resolved:  tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().  Martin KaFai Lau r | 
                
                | CVE-2024-50171 | In the Linux kernel, the following vulnerability has been resolved:  net: systemport: fix potential memory leak in bcm_sysport_xmit()  The bcm_syspor | 
                
                | CVE-2024-50156 | In the Linux kernel, the following vulnerability has been resolved:  drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()  If the allocatio | 
                
                | CVE-2024-50208 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages  Avoid memory corrupt | 
                
                | CVE-2024-50160 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: hda/cs8409: Fix possible NULL dereference  If snd_hda_gen_add_kctl fails t | 
                
                | CVE-2024-50209 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/bnxt_re: Add a check for memory allocation  __alloc_pbl() can return error | 
                
                | CVE-2024-50162 | In the Linux kernel, the following vulnerability has been resolved:  bpf: devmap: provide rxq after redirect  rxq contains a pointer to the device fr | 
                
                | CVE-2024-50163 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Make sure internal and UAPI bpf_redirect flags don't overlap  The bpf_redir | 
                
                | CVE-2024-35887 | In the Linux kernel, the following vulnerability has been resolved:  ax25: fix use-after-free bugs caused by ax25_ds_del_timer  When the ax25 device | 
                
                | CVE-2024-40965 | In the Linux kernel, the following vulnerability has been resolved:  i2c: lpi2c: Avoid calling clk_get_rate during transfer  Instead of repeatedly ca | 
                
                | CVE-2024-40982 | In the Linux kernel, the following vulnerability has been resolved:  ssb: Fix potential NULL pointer dereference in ssb_device_uevent()  The ssb_devi | 
                
                | CVE-2024-41066 | In the Linux kernel, the following vulnerability has been resolved:  ibmvnic: Add tx check to prevent skb leak  Below is a summary of how the driver | 
                
                | CVE-2024-42252 | In the Linux kernel, the following vulnerability has been resolved:  closures: Change BUG_ON() to WARN_ON()  If a BUG_ON() can be hit in the wild, it | 
                
                | CVE-2024-53097 | In the Linux kernel, the following vulnerability has been resolved:  mm: krealloc: Fix MTE false alarm in __do_krealloc  This patch addresses an issu |