| 2081699 | [g700] support p1v4 hardware | 
                
                | 2092506 | mtk-fsource: ubuntu kernel integration | 
                
                | 2090981 | [g1200-evk] Call trace appeared when reload mtk_mdp3 module | 
                
                | 2090978 | [g510] mt8188-mdla-devfreq probe failed message found in dmesg | 
                
                | 2090979 | Fail to detect card after unplugging DPoC cable and reboot | 
                
                | 2091990 | ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137 | 
                
                | 2086242 | Jammy update: v5.15.168 upstream stable release | 
                
                | 2080378 | IOMMU warnings on AMD systems after booting into kdump kernel | 
                
                | 2064176 | LXD fan bridge causes blocked tasks | 
                
                | 2085082 | Cannot detect audio sinks and sources in proposed kernel | 
                
                | 2077321 | Please backport the more restrictive XSAVES deactivation for  Zen1/2 arch | 
                
                | 2081279 | Jammy update: v5.15.167 upstream stable release | 
                
                | 2080594 | Jammy update: v5.15.166 upstream stable release | 
                
                | 1959940 | [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part | 
                
                | 2069961 | turbostat fails with too many open files on large systems | 
                
                | 2078428 | Jammy update: v5.15.165 upstream stable release | 
                
                | 2074380 | [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible | 
                
                | 2076100 | Jammy update: v5.15.164 upstream stable release | 
                
                | CVE-2024-50264 | In the Linux kernel, the following vulnerability has been resolved:  vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans  Du | 
                
                | CVE-2024-53057 | In the Linux kernel, the following vulnerability has been resolved:  net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT  In qdisc_tree_reduce_bac | 
                
                | CVE-2024-43904 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing | 
                
                | CVE-2024-40973 | In the Linux kernel, the following vulnerability has been resolved:  media: mtk-vcodec: potential null pointer deference in SCP  The return value of | 
                
                | CVE-2024-38553 | In the Linux kernel, the following vulnerability has been resolved:  net: fec: remove .ndo_poll_controller to avoid deadlocks  There is a deadlock is | 
                
                | CVE-2024-26822 | In the Linux kernel, the following vulnerability has been resolved:  smb: client: set correct id, uid and cruid for multiuser automounts  When uid, g | 
                
                | CVE-2020-12351 | Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 
                
                | CVE-2020-12352 | Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access. | 
                
                | CVE-2020-24490 | Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all | 
                
                | CVE-2024-40910 | In the Linux kernel, the following vulnerability has been resolved:  ax25: Fix refcount imbalance on inbound connections  When releasing a socket in | 
                
                | CVE-2024-35963 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: hci_sock: Fix not validating setsockopt user input  Check user input | 
                
                | CVE-2024-35965 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: L2CAP: Fix not validating setsockopt user input  Check user input len | 
                
                | CVE-2024-35966 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: RFCOMM: Fix not validating setsockopt user input  syzbot reported rfc | 
                
                | CVE-2024-35967 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: SCO: Fix not validating setsockopt user input  syzbot reported sco_so | 
                
                | CVE-2024-36968 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()  l2cap_le_flowctl_i | 
                
                | CVE-2024-35904 | In the Linux kernel, the following vulnerability has been resolved:  selinux: avoid dereference of garbage after mount failure  In case kern_mount() | 
                
                | CVE-2024-42156 | In the Linux kernel, the following vulnerability has been resolved:  s390/pkey: Wipe copies of clear-key structures on failure  Wipe all sensitive da | 
                
                | CVE-2024-44942 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC  syzbot | 
                
                | CVE-2024-38538 | In the Linux kernel, the following vulnerability has been resolved:  net: bridge: xmit: make sure we have at least eth header len bytes  syzbot trigg | 
                
                | CVE-2024-42158 | In the Linux kernel, the following vulnerability has been resolved:  s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings  Replace memzero_exp | 
                
                | CVE-2024-38667 | In the Linux kernel, the following vulnerability has been resolved:  riscv: prevent pt_regs corruption for secondary idle threads  Top of the kernel | 
                
                | CVE-2024-44940 | In the Linux kernel, the following vulnerability has been resolved:  fou: remove warn in gue_gro_receive on unsupported protocol  Drop the WARN_ON_ON | 
                
                | CVE-2024-42079 | In the Linux kernel, the following vulnerability has been resolved:  gfs2: Fix NULL pointer dereference in gfs2_log_flush  In gfs2_jindex_free(), set | 
                
                | CVE-2024-35951 | In the Linux kernel, the following vulnerability has been resolved:  drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()  Subject: [PAT | 
                
                | CVE-2023-52532 | In the Linux kernel, the following vulnerability has been resolved:  net: mana: Fix TX CQE error handling  For an unknown TX CQE error type (probably | 
                
                | CVE-2023-52621 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers  These thre | 
                
                | CVE-2024-26947 | In the Linux kernel, the following vulnerability has been resolved:  ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses  Sin | 
                
                | CVE-2023-52639 | In the Linux kernel, the following vulnerability has been resolved:  KVM: s390: vsie: fix race during shadow creation  Right now it is possible to se | 
                
                | CVE-2024-26800 | In the Linux kernel, the following vulnerability has been resolved:  tls: fix use-after-free on failed backlog decryption  When the decrypt request g | 
                
                | CVE-2024-41071 | In the Linux kernel, the following vulnerability has been resolved:  wifi: mac80211: Avoid address calculations via out of bounds array indexing  req | 
                
                | CVE-2024-40915 | In the Linux kernel, the following vulnerability has been resolved:  riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context  __kernel | 
                
                | CVE-2024-38611 | In the Linux kernel, the following vulnerability has been resolved:  media: i2c: et8ek8: Don't strip remove function when driver is builtin  Using __ | 
                
                | CVE-2024-38602 | In the Linux kernel, the following vulnerability has been resolved:  ax25: Fix reference count leak issues of ax25_dev  The ax25_addr_ax25dev() and a | 
                
                | CVE-2024-26669 | In the Linux kernel, the following vulnerability has been resolved:  net/sched: flower: Fix chain template offload  When a qdisc is deleted from a ne | 
                
                | CVE-2024-26607 | In the Linux kernel, the following vulnerability has been resolved:  drm/bridge: sii902x: Fix probing race issue  A null pointer dereference crash ha | 
                
                | CVE-2024-26893 | In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_scmi: Fix double free in SMC transport cleanup path  When the gene | 
                
                | CVE-2024-26661 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'  In | 
                
                | CVE-2024-25744 | In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c | 
                
                | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved:  netem: fix return value if duplicate enqueue fails  There is a bug in netem_enqu | 
                
                | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved:  watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger  When the | 
                
                | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_tables: use timestamp to check for set element timeout  Add a time |