| 1786013 | Packaging resync | 
                
                | 2098554 | wdat_wdt.ko should be pulled in by linux-image-virtual | 
                
                | 2102118 | Noble update: upstream stable patchset 2025-03-12 | 
                
                | 2098063 | Missing support for USB-C Apple Magic Trackpad | 
                
                | 2101915 | Noble update: upstream stable patchset 2025-03-11 | 
                
                | 2101042 | Noble update: upstream stable patchset 2025-03-06 | 
                
                | 2100894 | Noble update: upstream stable patchset 2025-03-04 | 
                
                | 2100292 | Noble update: upstream stable patchset 2025-02-27 | 
                
                | 2099996 | Noble update: upstream stable patchset 2025-02-25 | 
                
                | 2097575 | Noble update: upstream stable patchset 2025-02-07 | 
                
                | 2100264 | Fix NIC name changes for ice | 
                
                | 2099880 | Fix line-out playback on some platforms with Cirrus Logic \u201cDolphin\u201d hardware | 
                
                | 2098972 | Enable Large Language Model (LLM) workloads using Intel NPU | 
                
                | 2098104 | Patchset for TUXEDO devices | 
                
                | 2093871 | Introduce and use sendpages_ok() instead of sendpage_ok() in nvme-tcp and drbd | 
                
                | 2097824 | iBFT iSCSI out-of-bounds shift UBSAN warning | 
                
                | 2077722 | [Ubuntu 24.04] MultiVM - L2 guest(s) running stress-ng getting stuck at booting after triggering crash | 
                
                | 2091719 | btrfs will WARN_ON() in btrfs_remove_qgroup() unnecessarily | 
                
                | CVE-2024-41932 | In the Linux kernel, the following vulnerability has been resolved:  sched: fix warning in sched_setaffinity  Commit 8f9ea86fdf99b added some logic t | 
                
                | CVE-2024-57872 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove()  This will ensure | 
                
                | CVE-2024-56588 | In the Linux kernel, the following vulnerability has been resolved:  scsi: hisi_sas: Create all dump files during debugfs initialization  For the cur | 
                
                | CVE-2024-47794 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Prevent tailcall infinite loop caused by freplace  There is a potential inf | 
                
                | CVE-2024-56599 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath10k: avoid NULL pointer error during sdio remove  When running 'rmmod a | 
                
                | CVE-2024-56607 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()  When I try t | 
                
                | CVE-2024-56608 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'  An iss | 
                
                | CVE-2024-56609 | In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb  When removing kerne | 
                
                | CVE-2024-56782 | In the Linux kernel, the following vulnerability has been resolved:  ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()  acpi_dev | 
                
                | CVE-2024-48876 | In the Linux kernel, the following vulnerability has been resolved:  stackdepot: fix stack_depot_save_flags() in NMI context  Per documentation, stac | 
                
                | CVE-2024-56620 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: qcom: Only free platform MSIs when ESI is enabled  Otherwise, it will | 
                
                | CVE-2024-56621 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: core: Cancel RTC work during ufshcd_remove()  Currently, RTC work is | 
                
                | CVE-2024-49569 | In the Linux kernel, the following vulnerability has been resolved:  nvme-rdma: unquiesce admin_q before destroy it  Kernel will hang on destroy admi | 
                
                | CVE-2024-56632 | In the Linux kernel, the following vulnerability has been resolved:  nvme-tcp: fix the memleak while create new ctrl failed  Now while we create new | 
                
                | CVE-2024-56647 | In the Linux kernel, the following vulnerability has been resolved:  net: Fix icmp host relookup triggering ip_rt_bug  arp link failure may trigger i | 
                
                | CVE-2024-56775 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Fix handling of plane refcount  [Why] The mechanism to backup a | 
                
                | CVE-2024-56561 | In the Linux kernel, the following vulnerability has been resolved:  PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy()  pci_epc_destroy() | 
                
                | CVE-2024-56550 | In the Linux kernel, the following vulnerability has been resolved:  s390/stacktrace: Use break instead of return statement  arch_stack_walk_user_com | 
                
                | CVE-2024-56771 | In the Linux kernel, the following vulnerability has been resolved:  mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information  These fou | 
                
                | CVE-2024-56568 | In the Linux kernel, the following vulnerability has been resolved:  iommu/arm-smmu: Defer probe of clients after smmu device bound  Null pointer der | 
                
                | CVE-2024-56772 | In the Linux kernel, the following vulnerability has been resolved:  kunit: string-stream: Fix a UAF bug in kunit_init_suite()  In kunit_debugfs_crea | 
                
                | CVE-2024-56773 | In the Linux kernel, the following vulnerability has been resolved:  kunit: Fix potential null dereference in kunit_device_driver_test()  kunit_kzall | 
                
                | CVE-2024-56580 | In the Linux kernel, the following vulnerability has been resolved:  media: qcom: camss: fix error path on configuration of power domains  There is a | 
                
                | CVE-2024-57850 | In the Linux kernel, the following vulnerability has been resolved:  jffs2: Prevent rtime decompress memory corruption  The rtime decompression routi | 
                
                | CVE-2024-56583 | In the Linux kernel, the following vulnerability has been resolved:  sched/deadline: Fix warning in migrate_enable for boosted tasks  When running th | 
                
                | CVE-2024-56611 | In the Linux kernel, the following vulnerability has been resolved:  mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM | 
                
                | CVE-2024-56613 | In the Linux kernel, the following vulnerability has been resolved:  sched/numa: fix memory leak due to the overwritten vma->numab_state  [Problem De | 
                
                | CVE-2024-56584 | In the Linux kernel, the following vulnerability has been resolved:  io_uring/tctx: work around xa_store() allocation error issue  syzbot triggered t | 
                
                | CVE-2024-56781 | In the Linux kernel, the following vulnerability has been resolved:  powerpc/prom_init: Fixup missing powermac #size-cells  On some powermacs `escc` | 
                
                | CVE-2024-56785 | In the Linux kernel, the following vulnerability has been resolved:  MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a  Fix the dtc warnings | 
                
                | CVE-2024-56585 | In the Linux kernel, the following vulnerability has been resolved:  LoongArch: Fix sleeping in atomic context for PREEMPT_RT  Commit bab1c299f3945ff | 
                
                | CVE-2024-41935 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to shrink read extent node in batches  We use rwlock to protect core s | 
                
                | CVE-2024-43098 | In the Linux kernel, the following vulnerability has been resolved:  i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid de | 
                
                | CVE-2024-45828 | In the Linux kernel, the following vulnerability has been resolved:  i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request  Bus cleanup pa | 
                
                | CVE-2024-56586 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.  creat | 
                
                | CVE-2024-56587 | In the Linux kernel, the following vulnerability has been resolved:  leds: class: Protect brightness_show() with led_cdev->led_access mutex  There is | 
                
                | CVE-2024-56786 | In the Linux kernel, the following vulnerability has been resolved:  bpf: put bpf_link's program when link is safe to be deallocated  In general, BPF | 
                
                | CVE-2024-47141 | In the Linux kernel, the following vulnerability has been resolved:  pinmux: Use sequential access to access desc->pinmux data  When two client of th | 
                
                | CVE-2024-56589 | In the Linux kernel, the following vulnerability has been resolved:  scsi: hisi_sas: Add cond_resched() for no forced preemption model  For no forced | 
                
                | CVE-2024-56590 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet  This fix | 
                
                | CVE-2024-56592 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Call free_htab_elem() after htab_unlock_bucket()  For htab of maps, when th | 
                
                | CVE-2024-56593 | In the Linux kernel, the following vulnerability has been resolved:  wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_r | 
                
                | CVE-2024-56594 | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: set the right AMDGPU sg segment limitation  The driver needs to set | 
                
                | CVE-2024-57843 | In the Linux kernel, the following vulnerability has been resolved:  virtio-net: fix overflow inside virtnet_rq_alloc  When the frag just got a page, | 
                
                | CVE-2024-56596 | In the Linux kernel, the following vulnerability has been resolved:  jfs: fix array-index-out-of-bounds in jfs_readdir  The stbl might contain some i | 
                
                | CVE-2024-56597 | In the Linux kernel, the following vulnerability has been resolved:  jfs: fix shift-out-of-bounds in dbSplit  When dmt_budmin is less than zero, it c | 
                
                | CVE-2024-47143 | In the Linux kernel, the following vulnerability has been resolved:  dma-debug: fix a possible deadlock on radix_lock  radix_lock() shouldn't be held | 
                
                | CVE-2024-56601 | In the Linux kernel, the following vulnerability has been resolved:  net: inet: do not leave a dangling sk pointer in inet_create()  sock_init_data() | 
                
                | CVE-2024-56602 | In the Linux kernel, the following vulnerability has been resolved:  net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()  sock | 
                
                | CVE-2024-56603 | In the Linux kernel, the following vulnerability has been resolved:  net: af_can: do not leave a dangling sk pointer in can_create()  On error can_cr | 
                
                | CVE-2024-56604 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()  bt_ | 
                
                | CVE-2024-56605 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create | 
                
                | CVE-2024-56606 | In the Linux kernel, the following vulnerability has been resolved:  af_packet: avoid erroring out after sock_init_data() in packet_create()  After s | 
                
                | CVE-2024-47809 | In the Linux kernel, the following vulnerability has been resolved:  dlm: fix possible lkb_resource null dereference  This patch fixes a possible nul | 
                
                | CVE-2024-48873 | In the Linux kernel, the following vulnerability has been resolved:  wifi: rtw89: check return value of ieee80211_probereq_get() for RNR  The return | 
                
                | CVE-2024-56787 | In the Linux kernel, the following vulnerability has been resolved:  soc: imx8m: Probe the SoC driver as platform driver  With driver_async_probe=* o | 
                
                | CVE-2024-56610 | In the Linux kernel, the following vulnerability has been resolved:  kcsan: Turn report_filterlist_lock into a raw_spinlock  Ran Xiaokai reports that | 
                
                | CVE-2024-48875 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: don't take dev_replace rwsem on task already holding it  Running fstests | 
                
                | CVE-2024-57849 | In the Linux kernel, the following vulnerability has been resolved:  s390/cpum_sf: Handle CPU hotplug remove during sampling  CPU hotplug remove hand | 
                
                | CVE-2024-57876 | In the Linux kernel, the following vulnerability has been resolved:  drm/dp_mst: Fix resetting msg rx state after topology removal  If the MST topolo | 
                
                | CVE-2024-56616 | In the Linux kernel, the following vulnerability has been resolved:  drm/dp_mst: Fix MST sideband message body length check  Fix the MST sideband mes | 
                
                | CVE-2024-48881 | In the Linux kernel, the following vulnerability has been resolved:  bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again  Commit 028ddcac477b ( | 
                
                | CVE-2024-56619 | In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()  Syzbot | 
                
                | CVE-2024-56622 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: core: sysfs: Prevent div by zero  Prevent a division by 0 when monito | 
                
                | CVE-2024-56623 | In the Linux kernel, the following vulnerability has been resolved:  scsi: qla2xxx: Fix use after free on unload  System crash is observed with stack | 
                
                | CVE-2024-57874 | In the Linux kernel, the following vulnerability has been resolved:  arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL  Currently tagg | 
                
                | CVE-2024-56625 | In the Linux kernel, the following vulnerability has been resolved:  can: dev: can_set_termination(): allow sleeping GPIOs  In commit 6e86a1543c37 (" | 
                
                | CVE-2024-56626 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write  An offset from client | 
                
                | CVE-2024-56628 | In the Linux kernel, the following vulnerability has been resolved:  LoongArch: Add architecture specific huge_pte_clear()  When executing mm selftes | 
                
                | CVE-2024-56629 | In the Linux kernel, the following vulnerability has been resolved:  HID: wacom: fix when get product name maybe null pointer  Due to incorrect dev-> | 
                
                | CVE-2024-56630 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: free inode when ocfs2_get_init_inode() fails  syzbot is reporting busy in | 
                
                | CVE-2024-56631 | In the Linux kernel, the following vulnerability has been resolved:  scsi: sg: Fix slab-use-after-free read in sg_release()  Fix a use-after-free bug | 
                
                | CVE-2024-50051 | In the Linux kernel, the following vulnerability has been resolved:  spi: mpc52xx: Add cancel_work_sync before module remove  If we remove the module | 
                
                | CVE-2024-56633 | In the Linux kernel, the following vulnerability has been resolved:  tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg  The current sk memory | 
                
                | CVE-2024-56565 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to drop all discards after creating snapshot on lvm device  Piergiorgi | 
                
                | CVE-2024-56634 | In the Linux kernel, the following vulnerability has been resolved:  gpio: grgpio: Add NULL check in grgpio_probe  devm_kasprintf() can return a NULL | 
                
                | CVE-2024-56635 | In the Linux kernel, the following vulnerability has been resolved:  net: avoid potential UAF in default_operstate()  syzbot reported an UAF in defau | 
                
                | CVE-2024-56636 | In the Linux kernel, the following vulnerability has been resolved:  geneve: do not assume mac header is set in geneve_xmit_skb()  We should not assu | 
                
                | CVE-2024-56637 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: ipset: Hold module reference while requesting a module  User space ma | 
                
                | CVE-2024-56638 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_inner: incorrect percpu area handling under softirq  Softirq can | 
                
                | CVE-2024-52332 | In the Linux kernel, the following vulnerability has been resolved:  igb: Fix potential invalid memory access in igb_init_module()  The pci_register_ | 
                
                | CVE-2024-56640 | In the Linux kernel, the following vulnerability has been resolved:  net/smc: fix LGR and link use-after-free issue  We encountered a LGR/link use-af | 
                
                | CVE-2024-56641 | In the Linux kernel, the following vulnerability has been resolved:  net/smc: initialize close_work early to avoid warning  We encountered a warning | 
                
                | CVE-2024-56643 | In the Linux kernel, the following vulnerability has been resolved:  dccp: Fix memory leak in dccp_feat_change_recv  If dccp_feat_push_confirm() fail | 
                
                | CVE-2024-56644 | In the Linux kernel, the following vulnerability has been resolved:  net/ipv6: release expired exception dst cached in socket  Dst objects get leaked | 
                
                | CVE-2024-56645 | In the Linux kernel, the following vulnerability has been resolved:  can: j1939: j1939_session_new(): fix skb reference counting  Since j1939_session | 
                
                | CVE-2024-56648 | In the Linux kernel, the following vulnerability has been resolved:  net: hsr: avoid potential out-of-bound access in fill_frame_info()  syzbot is ab | 
                
                | CVE-2024-56649 | In the Linux kernel, the following vulnerability has been resolved:  net: enetc: Do not configure preemptible TCs if SIs do not support  Both ENETC P | 
                
                | CVE-2024-56783 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level  cgroup maxim | 
                
                | CVE-2024-56650 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: x_tables: fix LED ID check in led_tg_check()  Syzbot has reported the | 
                
                | CVE-2024-53222 | In the Linux kernel, the following vulnerability has been resolved:  zram: fix NULL pointer in comp_algorithm_show()  LTP reported a NULL pointer der | 
                
                | CVE-2024-53169 | In the Linux kernel, the following vulnerability has been resolved:  nvme-fabrics: fix kernel crash while shutting down controller  The nvme keep-ali | 
                
                | CVE-2024-56721 | In the Linux kernel, the following vulnerability has been resolved:  x86/CPU/AMD: Terminate the erratum_1386_microcode array  The erratum_1386_microc | 
                
                | CVE-2024-53187 | In the Linux kernel, the following vulnerability has been resolved:  io_uring: check for overflows in io_pin_pages  WARNING: CPU: 0 PID: 5834 at io_u | 
                
                | CVE-2024-53147 | In the Linux kernel, the following vulnerability has been resolved:  exfat: fix out-of-bounds access of directory entries  In the case of the directo | 
                
                | CVE-2024-53196 | In the Linux kernel, the following vulnerability has been resolved:  KVM: arm64: Don't retire aborted MMIO instruction  Returning an abort to the gue | 
                
                | CVE-2024-56685 | In the Linux kernel, the following vulnerability has been resolved:  ASoC: mediatek: Check num_codecs is not zero to avoid panic during probe  Follow | 
                
                | CVE-2024-53201 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe | 
                
                | CVE-2024-53203 | In the Linux kernel, the following vulnerability has been resolved:  usb: typec: fix potential array underflow in ucsi_ccg_sync_control()  The "comma | 
                
                | CVE-2024-53209 | In the Linux kernel, the following vulnerability has been resolved:  bnxt_en: Fix receive ring space parameters when XDP is active  The MTU setting a | 
                
                | CVE-2024-56742 | In the Linux kernel, the following vulnerability has been resolved:  vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages()  Fix an unwind is | 
                
                | CVE-2024-53216 | In the Linux kernel, the following vulnerability has been resolved:  nfsd: release svc_expkey/svc_export with rcu_work  The last reference for `cache | 
                
                | CVE-2024-53219 | In the Linux kernel, the following vulnerability has been resolved:  virtiofs: use pages instead of pointer for kernel direct IO  When trying to inse | 
                
                | CVE-2024-53221 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix null-ptr-deref in f2fs_submit_page_bio()  There's issue as follows whe | 
                
                | CVE-2024-53228 | In the Linux kernel, the following vulnerability has been resolved:  riscv: kvm: Fix out-of-bounds array access  In kvm_riscv_vcpu_sbi_init() the ent | 
                
                | CVE-2024-53232 | In the Linux kernel, the following vulnerability has been resolved:  iommu/s390: Implement blocking domain  This fixes a crash when surprise hot-unpl | 
                
                | CVE-2024-53236 | In the Linux kernel, the following vulnerability has been resolved:  xsk: Free skb when TX metadata options are invalid  When a new skb is allocated | 
                
                | CVE-2024-56703 | In the Linux kernel, the following vulnerability has been resolved:  ipv6: Fix soft lockups in fib6_select_path under high next hop churn  Soft locku | 
                
                | CVE-2024-56540 | In the Linux kernel, the following vulnerability has been resolved:  accel/ivpu: Prevent recovery invocation during probe and resume  Refactor IPC se | 
                
                | CVE-2024-53163 | In the Linux kernel, the following vulnerability has been resolved:  crypto: qat/qat_420xx - fix off by one in uof_get_name()  This is called from uo | 
                
                | CVE-2024-56755 | In the Linux kernel, the following vulnerability has been resolved:  netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING  In fscache_crea | 
                
                | CVE-2024-56549 | In the Linux kernel, the following vulnerability has been resolved:  cachefiles: Fix NULL pointer dereference in object->file  At present, the object | 
                
                | CVE-2024-56551 | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: fix usage slab after free  [  +0.000021] BUG: KASAN: slab-use-after- | 
                
                | CVE-2024-56776 | In the Linux kernel, the following vulnerability has been resolved:  drm/sti: avoid potential dereference of error pointers  The return value of drm_ | 
                
                | CVE-2024-56777 | In the Linux kernel, the following vulnerability has been resolved:  drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check | 
                
                | CVE-2024-56778 | In the Linux kernel, the following vulnerability has been resolved:  drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check | 
                
                | CVE-2024-56557 | In the Linux kernel, the following vulnerability has been resolved:  iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer  The AD7923 was u | 
                
                | CVE-2024-56779 | In the Linux kernel, the following vulnerability has been resolved:  nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur  The action force | 
                
                | CVE-2024-56558 | In the Linux kernel, the following vulnerability has been resolved:  nfsd: make sure exp active before svc_export_show  The function `e_show` was cal | 
                
                | CVE-2024-56562 | In the Linux kernel, the following vulnerability has been resolved:  i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()  if (dev- | 
                
                | CVE-2024-56566 | In the Linux kernel, the following vulnerability has been resolved:  mm/slub: Avoid list corruption when removing a slab from the full list  Boot wit | 
                
                | CVE-2024-57838 | In the Linux kernel, the following vulnerability has been resolved:  s390/entry: Mark IRQ entries to fix stack depot warnings  The stack depot filter | 
                
                | CVE-2024-56567 | In the Linux kernel, the following vulnerability has been resolved:  ad7780: fix division by zero in ad7780_write_raw()  In the ad7780_write_raw() , | 
                
                | CVE-2024-56569 | In the Linux kernel, the following vulnerability has been resolved:  ftrace: Fix regression with module command in stack_trace_filter  When executing | 
                
                | CVE-2024-56570 | In the Linux kernel, the following vulnerability has been resolved:  ovl: Filter invalid inodes with missing lookup function  Add a check to the ovl_ | 
                
                | CVE-2024-56572 | In the Linux kernel, the following vulnerability has been resolved:  media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_inter | 
                
                | CVE-2024-56573 | In the Linux kernel, the following vulnerability has been resolved:  efi/libstub: Free correct pointer on failure  cmdline_ptr is an out parameter, w | 
                
                | CVE-2024-56574 | In the Linux kernel, the following vulnerability has been resolved:  media: ts2020: fix null-ptr-deref in ts2020_probe()  KASAN reported a null-ptr-d | 
                
                | CVE-2024-56575 | In the Linux kernel, the following vulnerability has been resolved:  media: imx-jpeg: Ensure power suppliers be suspended before detach them  The pow | 
                
                | CVE-2024-56576 | In the Linux kernel, the following vulnerability has been resolved:  media: i2c: tc358743: Fix crash in the probe error path when using polling  If a | 
                
                | CVE-2024-56577 | In the Linux kernel, the following vulnerability has been resolved:  media: mtk-jpeg: Fix null-ptr-deref during unload module  The workqueue should b | 
                
                | CVE-2024-56578 | In the Linux kernel, the following vulnerability has been resolved:  media: imx-jpeg: Set video drvdata before register video device  The video drvda | 
                
                | CVE-2024-56579 | In the Linux kernel, the following vulnerability has been resolved:  media: amphion: Set video drvdata before register video device  The video drvdat | 
                
                | CVE-2024-56581 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: ref-verify: fix use-after-free after invalid ref action  At btrfs_ref_tre | 
                
                | CVE-2024-56774 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: add a sanity check for btrfs root in btrfs_search_slot()  Syzbot reports | 
                
                | CVE-2024-56780 | In the Linux kernel, the following vulnerability has been resolved:  quota: flush quota_release_work upon quota writeback  One of the paths quota wri | 
                
                | CVE-2024-53168 | In the Linux kernel, the following vulnerability has been resolved:  sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket  BUG: KASAN: slab-u | 
                
                | CVE-2024-56688 | In the Linux kernel, the following vulnerability has been resolved:  sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport  Since transport->sock | 
                
                | CVE-2024-56729 | In the Linux kernel, the following vulnerability has been resolved:  smb: Initialize cfid->tcon before performing network ops  Avoid leaking a tcon r | 
                
                | CVE-2024-56704 | In the Linux kernel, the following vulnerability has been resolved:  9p/xen: fix release of IRQ  Kernel logs indicate an IRQ was double-freed.  Pass | 
                
                | CVE-2024-53171 | In the Linux kernel, the following vulnerability has been resolved:  ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit  After an inse | 
                
                | CVE-2024-53172 | In the Linux kernel, the following vulnerability has been resolved:  ubi: fastmap: Fix duplicate slab cache names while attaching  Since commit 4c395 | 
                
                | CVE-2024-56739 | In the Linux kernel, the following vulnerability has been resolved:  rtc: check if __rtc_read_time was successful in rtc_timer_do_work()  If the __rt | 
                
                | CVE-2024-53173 | In the Linux kernel, the following vulnerability has been resolved:  NFSv4.0: Fix a use-after-free problem in the asynchronous open()  Yang Erkun rep | 
                
                | CVE-2024-53145 | In the Linux kernel, the following vulnerability has been resolved:  um: Fix potential integer overflow during physmem setup  This issue happens when | 
                
                | CVE-2024-53174 | In the Linux kernel, the following vulnerability has been resolved:  SUNRPC: make sure cache entry active before cache_show  The function `c_show` wa | 
                
                | CVE-2024-53146 | In the Linux kernel, the following vulnerability has been resolved:  NFSD: Prevent a potential integer overflow  If the tag length is >= U32_MAX - 3 | 
                
                | CVE-2024-53175 | In the Linux kernel, the following vulnerability has been resolved:  ipc: fix memleak if msg_init_ns failed in create_ipc_ns  Percpu memory allocatio | 
                
                | CVE-2024-56692 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to do sanity check on node blkaddr in truncate_node()  syzbot reports | 
                
                | CVE-2024-56698 | In the Linux kernel, the following vulnerability has been resolved:  usb: dwc3: gadget: Fix looping of queued SG entries  The dwc3_request->num_queue | 
                
                | CVE-2024-56687 | In the Linux kernel, the following vulnerability has been resolved:  usb: musb: Fix hardware lockup on first Rx endpoint request  There is a possibil | 
                
                | CVE-2024-53176 | In the Linux kernel, the following vulnerability has been resolved:  smb: During unmount, ensure all cached dir instances drop their dentry  The unmo | 
                
                | CVE-2024-53177 | In the Linux kernel, the following vulnerability has been resolved:  smb: prevent use-after-free due to open_cached_dir error paths  If open_cached_d | 
                
                | CVE-2024-53178 | In the Linux kernel, the following vulnerability has been resolved:  smb: Don't leak cfid when reconnect races with open_cached_dir  open_cached_dir( | 
                
                | CVE-2024-53180 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: pcm: Add sanity NULL check for the default mmap fault handler  A driver mi | 
                
                | CVE-2024-56700 | In the Linux kernel, the following vulnerability has been resolved:  media: wl128x: Fix atomicity violation in fmc_send_cmd()  Atomicity violation oc | 
                
                | CVE-2022-49034 | In the Linux kernel, the following vulnerability has been resolved:  sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK  When CONFIG_CPUMASK_OFFS | 
                
                | CVE-2024-53181 | In the Linux kernel, the following vulnerability has been resolved:  um: vector: Do not use drvdata in release  The drvdata is not available in relea | 
                
                | CVE-2024-53183 | In the Linux kernel, the following vulnerability has been resolved:  um: net: Do not use drvdata in release  The drvdata is not available in release. | 
                
                | CVE-2024-53184 | In the Linux kernel, the following vulnerability has been resolved:  um: ubd: Do not use drvdata in release  The drvdata is not available in release. | 
                
                | CVE-2024-53185 | In the Linux kernel, the following vulnerability has been resolved:  smb: client: fix NULL ptr deref in crypto_aead_setkey()  Neither SMB3.0 or SMB3. | 
                
                | CVE-2024-53188 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath12k: fix crash when unbinding  If there is an error during some initial | 
                
                | CVE-2024-53190 | In the Linux kernel, the following vulnerability has been resolved:  wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures | 
                
                | CVE-2024-53191 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath12k: fix warning when unbinding  If there is an error during some initi | 
                
                | CVE-2024-56741 | In the Linux kernel, the following vulnerability has been resolved:  apparmor: test: Fix memory leak for aa_unpack_strdup()  The string allocated by | 
                
                | CVE-2024-53148 | In the Linux kernel, the following vulnerability has been resolved:  comedi: Flush partial mappings in error case  If some remap_pfn_range() calls su | 
                
                | CVE-2024-53194 | In the Linux kernel, the following vulnerability has been resolved:  PCI: Fix use-after-free of slot->bus on hot remove  Dennis reports a boot crash | 
                
                | CVE-2024-53195 | In the Linux kernel, the following vulnerability has been resolved:  KVM: arm64: Get rid of userspace_irqchip_in_use  Improper use of userspace_irqch | 
                
                | CVE-2024-53197 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices | 
                
                | CVE-2024-42122 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Add NULL pointer check for kzalloc  [Why & How] Check return po | 
                
                | CVE-2024-49906 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Check null pointer before try to access it  [why & how] Change | 
                
                | CVE-2024-53150 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: usb-audio: Fix out of bounds reads when finding clock sources  The current | 
                
                | CVE-2024-53198 | In the Linux kernel, the following vulnerability has been resolved:  xen: Fix the issue of resource not being properly released in xenbus_dev_probe() | 
                
                | CVE-2024-41014 | In the Linux kernel, the following vulnerability has been resolved:  xfs: add bounds checking to xlog_recover_process_data  There is a lack of verifi | 
                
                | CVE-2024-53200 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Fix null check for pipe_ctx->plane_state in hwss_setup_dpp  Thi | 
                
                | CVE-2024-53202 | In the Linux kernel, the following vulnerability has been resolved:  firmware_loader: Fix possible resource leak in fw_log_firmware_info()  The alg i | 
                
                | CVE-2024-53208 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync  This fixes th | 
                
                | CVE-2024-53210 | In the Linux kernel, the following vulnerability has been resolved:  s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()  Passing MSG_PEEK | 
                
                | CVE-2024-53213 | In the Linux kernel, the following vulnerability has been resolved:  net: usb: lan78xx: Fix double free issue with interrupt buffer allocation  In la | 
                
                | CVE-2024-53214 | In the Linux kernel, the following vulnerability has been resolved:  vfio/pci: Properly hide first-in-list PCIe extended capability  There are cases | 
                
                | CVE-2024-53215 | In the Linux kernel, the following vulnerability has been resolved:  svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()  There's issue | 
                
                | CVE-2024-53217 | In the Linux kernel, the following vulnerability has been resolved:  NFSD: Prevent NULL dereference in nfsd4_process_cb_update()  @ses is initialized | 
                
                | CVE-2024-56689 | In the Linux kernel, the following vulnerability has been resolved:  PCI: endpoint: epf-mhi: Avoid NULL dereference if DT lacks 'mmio'  If platform_g | 
                
                | CVE-2024-53151 | In the Linux kernel, the following vulnerability has been resolved:  svcrdma: Address an integer overflow  Dan Carpenter reports: > Commit 78147ca8b4 | 
                
                | CVE-2024-53218 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix race in concurrent f2fs_stop_gc_thread  In my test case, concurrent ca | 
                
                | CVE-2024-56744 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to avoid potential deadlock in f2fs_record_stop_reason()  syzbot repor | 
                
                | CVE-2024-53220 | In the Linux kernel, the following vulnerability has been resolved:  f2fs: fix to account dirty data in __get_secs_required()  It will trigger system | 
                
                | CVE-2024-56745 | In the Linux kernel, the following vulnerability has been resolved:  PCI: Fix reset_method_store() memory leak  In reset_method_store(), a string is | 
                
                | CVE-2024-53223 | In the Linux kernel, the following vulnerability has been resolved:  clk: ralink: mtmips: fix clocks probe order in oldest ralink SoCs  Base clocks a | 
                
                | CVE-2024-53154 | In the Linux kernel, the following vulnerability has been resolved:  clk: clk-apple-nco: Add NULL check in applnco_probe  Add NULL check in applnco_p | 
                
                | CVE-2024-53224 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/mlx5: Move events notifier registration to be after device registration  Mo | 
                
                | CVE-2024-56746 | In the Linux kernel, the following vulnerability has been resolved:  fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem()  When inform | 
                
                | CVE-2024-53155 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: fix uninitialized value in ocfs2_file_read_iter()  Syzbot has reported th | 
                
                | CVE-2024-53226 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()  ib_map_mr_sg() al | 
                
                | CVE-2024-56747 | In the Linux kernel, the following vulnerability has been resolved:  scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()  Hook "qedi_o | 
                
                | CVE-2024-56748 | In the Linux kernel, the following vulnerability has been resolved:  scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()  Hook "qed_op | 
                
                | CVE-2024-53229 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/rxe: Fix the qp flush warnings in req  When the qp is in error state, the s | 
                
                | CVE-2024-56722 | In the Linux kernel, the following vulnerability has been resolved:  RDMA/hns: Fix cpu stuck caused by printings during reset  During reset, cmd to d | 
                
                | CVE-2024-53230 | In the Linux kernel, the following vulnerability has been resolved:  cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost()  cpufreq_cpu_ | 
                
                | CVE-2024-53231 | In the Linux kernel, the following vulnerability has been resolved:  cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()  cpufreq_cp | 
                
                | CVE-2024-56701 | In the Linux kernel, the following vulnerability has been resolved:  powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore  The dtl_access_lock n | 
                
                | CVE-2024-56678 | In the Linux kernel, the following vulnerability has been resolved:  powerpc/mm/fault: Fix kfence page fault reporting  copy_from_kernel_nofault() ca | 
                
                | CVE-2024-56677 | In the Linux kernel, the following vulnerability has been resolved:  powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()  Durin | 
                
                | CVE-2024-56723 | In the Linux kernel, the following vulnerability has been resolved:  mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices  While design wise th | 
                
                | CVE-2024-56724 | In the Linux kernel, the following vulnerability has been resolved:  mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device  While design wise the | 
                
                | CVE-2024-56691 | In the Linux kernel, the following vulnerability has been resolved:  mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device  While design wi | 
                
                | CVE-2024-53233 | In the Linux kernel, the following vulnerability has been resolved:  unicode: Fix utf8_load() error path  utf8_load() requests the symbol "utf8_data_ | 
                
                | CVE-2024-56694 | In the Linux kernel, the following vulnerability has been resolved:  bpf: fix recursive lock when verdict program return SK_PASS  When the stream_ver | 
                
                | CVE-2024-53234 | In the Linux kernel, the following vulnerability has been resolved:  erofs: handle NONHEAD !delta[1] lclusters gracefully  syzbot reported a WARNING | 
                
                | CVE-2024-53239 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: 6fire: Release resources at card release  The current 6fire code tries to | 
                
                | CVE-2024-56531 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: caiaq: Use snd_card_free_when_closed() at disconnection  The USB disconnec | 
                
                | CVE-2024-56532 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: us122l: Use snd_card_free_when_closed() at disconnection  The USB disconne | 
                
                | CVE-2024-56533 | In the Linux kernel, the following vulnerability has been resolved:  ALSA: usx2y: Use snd_card_free_when_closed() at disconnection  The USB disconnec | 
                
                | CVE-2024-56751 | In the Linux kernel, the following vulnerability has been resolved:  ipv6: release nexthop on device removal  The CI is hitting some aperiodic hangup | 
                
                | CVE-2024-56720 | In the Linux kernel, the following vulnerability has been resolved:  bpf, sockmap: Several fixes to bpf_msg_pop_data  Several fixes to bpf_msg_pop_da | 
                
                | CVE-2024-56538 | In the Linux kernel, the following vulnerability has been resolved:  drm: zynqmp_kms: Unplug DRM device before removal  Prevent userspace accesses to | 
                
                | CVE-2024-56752 | In the Linux kernel, the following vulnerability has been resolved:  drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()  When the call t | 
                
                | CVE-2024-56725 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c  Add error pointer | 
                
                | CVE-2024-56707 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c  Add error poin | 
                
                | CVE-2024-56726 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c  Add error pointer chec | 
                
                | CVE-2024-56727 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c  Adding error poin | 
                
                | CVE-2024-56728 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c  Add error point | 
                
                | CVE-2024-56679 | In the Linux kernel, the following vulnerability has been resolved:  octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c  Add error pointe | 
                
                | CVE-2024-56539 | In the Linux kernel, the following vulnerability has been resolved:  wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan( | 
                
                | CVE-2024-56543 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath12k: Skip Rx TID cleanup for self peer  During peer create, dp setup fo | 
                
                | CVE-2024-56683 | In the Linux kernel, the following vulnerability has been resolved:  drm/vc4: hdmi: Avoid hang with debug registers when suspended  Trying to read /s | 
                
                | CVE-2024-56545 | In the Linux kernel, the following vulnerability has been resolved:  HID: hyperv: streamline driver probe to avoid devres issues  It was found that u | 
                
                | CVE-2024-56705 | In the Linux kernel, the following vulnerability has been resolved:  media: atomisp: Add check for rgby_data memory allocation failure  In ia_css_3a_ | 
                
                | CVE-2024-53157 | In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_scpi: Check the DVFS OPP count returned by the firmware  Fix a ker | 
                
                | CVE-2024-53158 | In the Linux kernel, the following vulnerability has been resolved:  soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()  This loop is s | 
                
                | CVE-2024-56546 | In the Linux kernel, the following vulnerability has been resolved:  drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()  If we | 
                
                | CVE-2024-56681 | In the Linux kernel, the following vulnerability has been resolved:  crypto: bcm - add error check in the ahash_hmac_init function  The ahash_init fu | 
                
                | CVE-2024-53160 | In the Linux kernel, the following vulnerability has been resolved:  rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu  KCSAN reports a data | 
                
                | CVE-2024-56708 | In the Linux kernel, the following vulnerability has been resolved:  EDAC/igen6: Avoid segmentation fault on module unload  The segmentation fault ha | 
                
                | CVE-2024-56690 | In the Linux kernel, the following vulnerability has been resolved:  crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EB | 
                
                | CVE-2024-53161 | In the Linux kernel, the following vulnerability has been resolved:  EDAC/bluefield: Fix potential integer overflow  The 64-bit argument for the "get | 
                
                | CVE-2024-53162 | In the Linux kernel, the following vulnerability has been resolved:  crypto: qat/qat_4xxx - fix off by one in uof_get_name()  The fw_objs[] array has | 
                
                | CVE-2024-56754 | In the Linux kernel, the following vulnerability has been resolved:  crypto: caam - Fix the pointer passed to caam_qi_shutdown()  The type of the las | 
                
                | CVE-2024-56548 | In the Linux kernel, the following vulnerability has been resolved:  hfsplus: don't query the device logical block size multiple times  Devices block | 
                
                | CVE-2024-56756 | In the Linux kernel, the following vulnerability has been resolved:  nvme-pci: fix freeing of the HMB descriptor table  The HMB descriptor table is s | 
                
                | CVE-2024-53142 | In the Linux kernel, the following vulnerability has been resolved:  initramfs: avoid filename buffer overrun  The initramfs filename field is define | 
                
                | CVE-2024-56693 | In the Linux kernel, the following vulnerability has been resolved:  brd: defer automatic disk creation until module initialization succeeds  My coll | 
                
                | CVE-2024-44955 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute  [Why] When un | 
                
                | CVE-2024-49899 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/display: Initialize denominators' default to 1  [WHAT & HOW] Variables u | 
                
                | CVE-2024-50270 | In the Linux kernel, the following vulnerability has been resolved:  mm/damon/core: avoid overflow in damon_feed_loop_next_input()  damon_feed_loop_n | 
                
                | CVE-2024-50274 | In the Linux kernel, the following vulnerability has been resolved:  idpf: avoid vport access in idpf_get_link_ksettings  When the device control pla | 
                
                | CVE-2024-53067 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: core: Start the RTC update work later  The RTC update work involves r | 
                
                | CVE-2024-53084 | In the Linux kernel, the following vulnerability has been resolved:  drm/imagination: Break an object reference loop  When remaining resources are be | 
                
                | CVE-2024-53085 | In the Linux kernel, the following vulnerability has been resolved:  tpm: Lock TPM chip in tpm_pm_suspend() first  Setting TPM_CHIP_FLAG_SUSPENDED in | 
                
                | CVE-2024-53086 | In the Linux kernel, the following vulnerability has been resolved:  drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL  Upo | 
                
                | CVE-2024-53087 | In the Linux kernel, the following vulnerability has been resolved:  drm/xe: Fix possible exec queue leak in exec IOCTL  In a couple of places after | 
                
                | CVE-2024-50288 | In the Linux kernel, the following vulnerability has been resolved:  media: vivid: fix buffer overwrite when using > 32 buffers  The maximum number o | 
                
                | CVE-2024-50289 | In the Linux kernel, the following vulnerability has been resolved:  media: av7110: fix a spectre vulnerability  As warned by smatch: 	drivers/stagin | 
                
                | CVE-2024-53062 | In the Linux kernel, the following vulnerability has been resolved:  media: mgb4: protect driver against spectre  Frequency range is set from sysfs v | 
                
                | CVE-2024-50291 | In the Linux kernel, the following vulnerability has been resolved:  media: dvb-core: add missing buffer index check  dvb_vb2_expbuf() didn't check i | 
                
                | CVE-2024-50297 | In the Linux kernel, the following vulnerability has been resolved:  net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts  Enqueue | 
                
                | CVE-2024-50267 | In the Linux kernel, the following vulnerability has been resolved:  USB: serial: io_edgeport: fix use after free in debug printk  The "dev_dbg(&urb- | 
                
                | CVE-2024-50268 | In the Linux kernel, the following vulnerability has been resolved:  usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()  Th | 
                
                | CVE-2024-53083 | In the Linux kernel, the following vulnerability has been resolved:  usb: typec: qcom-pmic: init value of hdr_len/txbuf_len earlier  If the read of U | 
                
                | CVE-2024-50269 | In the Linux kernel, the following vulnerability has been resolved:  usb: musb: sunxi: Fix accessing an released usb phy  Commit 6ed05c68cbca ("usb: | 
                
                | CVE-2024-50271 | In the Linux kernel, the following vulnerability has been resolved:  signal: restore the override_rlimit logic  Prior to commit d64696905554 ("Reimpl | 
                
                | CVE-2024-50272 | In the Linux kernel, the following vulnerability has been resolved:  filemap: Fix bounds checking in filemap_read()  If the caller supplies an iocb-> | 
                
                | CVE-2024-50273 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: reinitialize delayed ref list after deleting it from the list  At insert_ | 
                
                | CVE-2024-50275 | In the Linux kernel, the following vulnerability has been resolved:  arm64/sve: Discard stale CPU state when handling SVE traps  The logic for handli | 
                
                | CVE-2024-50276 | In the Linux kernel, the following vulnerability has been resolved:  net: vertexcom: mse102x: Fix possible double free of TX skb  The scope of the TX | 
                
                | CVE-2024-53066 | In the Linux kernel, the following vulnerability has been resolved:  nfs: Fix KMSAN warning in decode_getfattr_attrs()  Fix the following KMSAN warni | 
                
                | CVE-2024-50278 | In the Linux kernel, the following vulnerability has been resolved:  dm cache: fix potential out-of-bounds access on the first resume  Out-of-bounds | 
                
                | CVE-2024-50279 | In the Linux kernel, the following vulnerability has been resolved:  dm cache: fix out-of-bounds access to the dirty bitset when resizing  dm-cache c | 
                
                | CVE-2024-50280 | In the Linux kernel, the following vulnerability has been resolved:  dm cache: fix flushing uninitialized delayed_work on cache_ctr error  An unexpec | 
                
                | CVE-2024-53060 | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported  acpi_eval | 
                
                | CVE-2024-50282 | In the Linux kernel, the following vulnerability has been resolved:  drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()  Avoid a pos | 
                
                | CVE-2024-50283 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp  ksmbd_user_session_put | 
                
                | CVE-2024-50284 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: Fix the missing xa_store error check  xa_store() can fail, it return xa_e | 
                
                | CVE-2024-50285 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: check outstanding simultaneous SMB operations  If Client send simultaneou | 
                
                | CVE-2024-50286 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create  There is a race con | 
                
                | CVE-2024-50287 | In the Linux kernel, the following vulnerability has been resolved:  media: v4l2-tpg: prevent the risk of a division by zero  As reported by Coverity | 
                
                | CVE-2024-50290 | In the Linux kernel, the following vulnerability has been resolved:  media: cx24116: prevent overflows on SNR calculus  as reported by Coverity, if r | 
                
                | CVE-2024-53061 | In the Linux kernel, the following vulnerability has been resolved:  media: s5p-jpeg: prevent buffer overflows  The current logic allows word to be l | 
                
                | CVE-2024-53081 | In the Linux kernel, the following vulnerability has been resolved:  media: ar0521: don't overflow when checking PLL values  The PLL checks are compa | 
                
                | CVE-2024-50292 | In the Linux kernel, the following vulnerability has been resolved:  ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove  In case o | 
                
                | CVE-2024-50294 | In the Linux kernel, the following vulnerability has been resolved:  rxrpc: Fix missing locking causing hanging calls  If a call gets aborted (e.g. b | 
                
                | CVE-2024-50295 | In the Linux kernel, the following vulnerability has been resolved:  net: arc: fix the device for dma_map_single/dma_unmap_single  The ndev->dev and | 
                
                | CVE-2024-53082 | In the Linux kernel, the following vulnerability has been resolved:  virtio_net: Add hash_key_length check  Add hash_key_length check in virtnet_prob | 
                
                | CVE-2024-50296 | In the Linux kernel, the following vulnerability has been resolved:  net: hns3: fix kernel crash when uninstalling driver  When the driver is uninsta | 
                
                | CVE-2024-53088 | In the Linux kernel, the following vulnerability has been resolved:  i40e: fix race condition by adding filter's intermediate sync state  Fix a race | 
                
                | CVE-2024-50298 | In the Linux kernel, the following vulnerability has been resolved:  net: enetc: allocate vf_state during PF probes  In the previous implementation, | 
                
                | CVE-2024-50299 | In the Linux kernel, the following vulnerability has been resolved:  sctp: properly validate chunk size in sctp_sf_ootb()  A size validation fix simi | 
                
                | CVE-2024-50300 | In the Linux kernel, the following vulnerability has been resolved:  regulator: rtq2208: Fix uninitialized use of regulator_config  Fix rtq2208 drive | 
                
                | CVE-2024-50301 | In the Linux kernel, the following vulnerability has been resolved:  security/keys: fix slab-out-of-bounds in key_task_permission  KASAN reports an o | 
                
                | CVE-2024-53072 | In the Linux kernel, the following vulnerability has been resolved:  platform/x86/amd/pmc: Detect when STB is not available  Loading the amd_pmc modu | 
                
                | CVE-2024-53068 | In the Linux kernel, the following vulnerability has been resolved:  firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier()  The scmi_dev | 
                
                | CVE-2024-53050 | In the Linux kernel, the following vulnerability has been resolved:  drm/i915/hdcp: Add encoder check in hdcp2_get_capability  Add encoder check in i | 
                
                | CVE-2024-53051 | In the Linux kernel, the following vulnerability has been resolved:  drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability  Sometimes during | 
                
                | CVE-2024-50303 | In the Linux kernel, the following vulnerability has been resolved:  resource,kexec: walk_system_ram_res_rev must retain resource flags  walk_system_ | 
                
                | CVE-2024-50263 | In the Linux kernel, the following vulnerability has been resolved:  fork: only invoke khugepaged, ksm hooks if no error  There is no reason to invok | 
                
                | CVE-2024-50220 | In the Linux kernel, the following vulnerability has been resolved:  fork: do not invoke uffd on fork if error occurs  Patch series "fork: do not exp | 
                
                | CVE-2024-50221 | In the Linux kernel, the following vulnerability has been resolved:  drm/amd/pm: Vangogh: Fix kernel memory out of bounds write  KASAN reports that t | 
                
                | CVE-2024-53053 | In the Linux kernel, the following vulnerability has been resolved:  scsi: ufs: core: Fix another deadlock during RTC update  If ufshcd_rtc_work call | 
                
                | CVE-2024-50225 | In the Linux kernel, the following vulnerability has been resolved:  btrfs: fix error propagation of split bios  The purpose of btrfs_bbio_propagate_ | 
                
                | CVE-2024-50230 | In the Linux kernel, the following vulnerability has been resolved:  nilfs2: fix kernel bug due to missing clearing of checked flag  Syzbot reported | 
                
                | CVE-2024-50238 | In the Linux kernel, the following vulnerability has been resolved:  phy: qcom: qmp-usbc: fix NULL-deref on runtime suspend  Commit 413db06c05e7 ("ph | 
                
                | CVE-2024-53044 | In the Linux kernel, the following vulnerability has been resolved:  net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext()  This comm | 
                
                | CVE-2024-50304 | In the Linux kernel, the following vulnerability has been resolved:  ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()  The per-n | 
                
                | CVE-2024-53048 | In the Linux kernel, the following vulnerability has been resolved:  ice: fix crash on probe for DPLL enabled E810 LOM  The E810 Lan On Motherboard ( | 
                
                | CVE-2024-53045 | In the Linux kernel, the following vulnerability has been resolved:  ASoC: dapm: fix bounds checker error in dapm_widget_list_create  The widgets arr | 
                
                | CVE-2024-53055 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: fix 6 GHz scan construction  If more than 255 colocated APs | 
                
                | CVE-2024-53046 | In the Linux kernel, the following vulnerability has been resolved:  arm64: dts: imx8ulp: correct the flexspi compatible string  The flexspi on imx8u | 
                
                | CVE-2024-53052 | In the Linux kernel, the following vulnerability has been resolved:  io_uring/rw: fix missing NOWAIT check for O_DIRECT start write  When io_uring st | 
                
                | CVE-2024-50215 | In the Linux kernel, the following vulnerability has been resolved:  nvmet-auth: assign dh_key to NULL after kfree_sensitive  ctrl->dh_key might be u | 
                
                | CVE-2024-50216 | In the Linux kernel, the following vulnerability has been resolved:  xfs: fix finding a last resort AG in xfs_filestream_pick_ag  When the main loop | 
                
                | CVE-2024-53043 | In the Linux kernel, the following vulnerability has been resolved:  mctp i2c: handle NULL header address  daddr can be NULL if there is no neighbour | 
                
                | CVE-2024-50218 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow  Syzbot reported a kerne | 
                
                | CVE-2024-53047 | In the Linux kernel, the following vulnerability has been resolved:  mptcp: init: protect sched with rcu_read_lock  Enabling CONFIG_PROVE_RCU_LIST wi | 
                
                | CVE-2024-50222 | In the Linux kernel, the following vulnerability has been resolved:  iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP  generic/077 | 
                
                | CVE-2024-50223 | In the Linux kernel, the following vulnerability has been resolved:  sched/numa: Fix the potential null pointer dereference in task_numa_work()  When | 
                
                | CVE-2024-50224 | In the Linux kernel, the following vulnerability has been resolved:  spi: spi-fsl-dspi: Fix crash when not using GPIO chip select  Add check for the | 
                
                | CVE-2024-50226 | In the Linux kernel, the following vulnerability has been resolved:  cxl/port: Fix use-after-free, permit out-of-order decoder shutdown  In support o | 
                
                | CVE-2024-50231 | In the Linux kernel, the following vulnerability has been resolved:  iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table()  modprobe | 
                
                | CVE-2024-53076 | In the Linux kernel, the following vulnerability has been resolved:  iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scal | 
                
                | CVE-2024-50232 | In the Linux kernel, the following vulnerability has been resolved:  iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()  In the ad712 | 
                
                | CVE-2024-50234 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlegacy: Clear stale interrupts before resuming device  iwl4965 fails upo | 
                
                | CVE-2024-50235 | In the Linux kernel, the following vulnerability has been resolved:  wifi: cfg80211: clear wdev->cqm_config pointer on free  When we free wdev->cqm_c | 
                
                | CVE-2024-50236 | In the Linux kernel, the following vulnerability has been resolved:  wifi: ath10k: Fix memory leak in management tx  In the current logic, memory is | 
                
                | CVE-2024-50237 | In the Linux kernel, the following vulnerability has been resolved:  wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower  Avoid p | 
                
                | CVE-2024-50239 | In the Linux kernel, the following vulnerability has been resolved:  phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend  Commit 413db06c05e | 
                
                | CVE-2024-50240 | In the Linux kernel, the following vulnerability has been resolved:  phy: qcom: qmp-usb: fix NULL-deref on runtime suspend  Commit 413db06c05e7 ("phy | 
                
                | CVE-2024-50242 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Additional check in ntfs_file_release | 
                
                | CVE-2024-50243 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Fix general protection fault in run_is_mapped_full  Fixed deleating of | 
                
                | CVE-2024-50244 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Additional check in ni_clear()  Checking of NTFS_FLAGS_LOG_REPLAYING a | 
                
                | CVE-2024-50245 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Fix possible deadlock in mi_read  Mutex lock with another subclass use | 
                
                | CVE-2024-50246 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Add rough attr alloc_size check | 
                
                | CVE-2024-50247 | In the Linux kernel, the following vulnerability has been resolved:  fs/ntfs3: Check if more than chunk-size bytes are written  A incorrectly formatt | 
                
                | CVE-2024-50250 | In the Linux kernel, the following vulnerability has been resolved:  fsdax: dax_unshare_iter needs to copy entire blocks  The code that copies data f | 
                
                | CVE-2024-50251 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_payload: sanitize offset and length before calling skb_checksum() | 
                
                | CVE-2024-50252 | In the Linux kernel, the following vulnerability has been resolved:  mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address  The dev | 
                
                | CVE-2024-50255 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs  Fix __hci_cmd_s | 
                
                | CVE-2024-50257 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: Fix use-after-free in get_info()  ip6table_nat module unload has refc | 
                
                | CVE-2024-50258 | In the Linux kernel, the following vulnerability has been resolved:  net: fix crash when config small gso_max_size/gso_ipv4_max_size  Config a small | 
                
                | CVE-2024-50262 | In the Linux kernel, the following vulnerability has been resolved:  bpf: Fix out-of-bounds write in trie_get_next_key()  trie_get_next_key() allocat | 
                
                | CVE-2024-50259 | In the Linux kernel, the following vulnerability has been resolved:  netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_acti | 
                
                | CVE-2024-53042 | In the Linux kernel, the following vulnerability has been resolved:  ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()  Ther | 
                
                | CVE-2024-53058 | In the Linux kernel, the following vulnerability has been resolved:  net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data  In case t | 
                
                | CVE-2024-50261 | In the Linux kernel, the following vulnerability has been resolved:  macsec: Fix use-after-free while sending the offloading packet  KASAN reports th | 
                
                | CVE-2024-53059 | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()  1. The | 
                
                | CVE-2025-21756 | In the Linux kernel, the following vulnerability has been resolved:  vsock: Keep the binding until socket destruction  Preserve sockets bindings; thi | 
                
                | CVE-2024-50256 | In the Linux kernel, the following vulnerability has been resolved:  netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()  I got a syzb | 
                
                | CVE-2025-21702 | In the Linux kernel, the following vulnerability has been resolved:  pfifo_tail_enqueue: Drop new packet when sch->limit == 0  Expected behaviour: In | 
                
                | CVE-2024-50167 | In the Linux kernel, the following vulnerability has been resolved:  be2net: fix potential memory leak in be_xmit()  The be_xmit() returns NETDEV_TX_ | 
                
                | CVE-2024-56765 | In the Linux kernel, the following vulnerability has been resolved:  powerpc/pseries/vas: Add close() callback in vas_vm_ops struct  The mapping VMA | 
                
                | CVE-2025-21700 | In the Linux kernel, the following vulnerability has been resolved:  net: sched: Disallow replacing of child qdisc from one parent to another  Lion A | 
                
                | CVE-2024-56615 | In the Linux kernel, the following vulnerability has been resolved:  bpf: fix OOB devmap writes when deleting elements  Jordy reported issue against | 
                
                | CVE-2024-56651 | In the Linux kernel, the following vulnerability has been resolved:  can: hi311x: hi3110_can_ist(): fix potential use-after-free  The commit a22bd630 | 
                
                | CVE-2024-56627 | In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read  An offset from client co | 
                
                | CVE-2024-56600 | In the Linux kernel, the following vulnerability has been resolved:  net: inet6: do not leave a dangling sk pointer in inet6_create()  sock_init_data | 
                
                | CVE-2024-56661 | In the Linux kernel, the following vulnerability has been resolved:  tipc: fix NULL deref in cleanup_bearer()  syzbot found [1] that after blamed com | 
                
                | CVE-2024-56642 | In the Linux kernel, the following vulnerability has been resolved:  tipc: Fix use-after-free of kernel socket in cleanup_bearer().  syzkaller report | 
                
                | CVE-2024-53227 | In the Linux kernel, the following vulnerability has been resolved:  scsi: bfa: Fix use-after-free in bfad_im_module_exit()  BUG: KASAN: slab-use-aft | 
                
                | CVE-2024-53237 | In the Linux kernel, the following vulnerability has been resolved:  Bluetooth: fix use-after-free in device_for_each_child()  Syzbot has reported th | 
                
                | CVE-2024-53166 | In the Linux kernel, the following vulnerability has been resolved:  block, bfq: fix bfqq uaf in bfq_limit_depth()  Set new allocated bfqq to bic or | 
                
                | CVE-2024-50265 | In the Linux kernel, the following vulnerability has been resolved:  ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()  S | 
                
                | CVE-2024-50249 | In the Linux kernel, the following vulnerability has been resolved:  ACPI: CPPC: Make rmw_lock a raw_spin_lock  The following BUG was triggered:  === | 
                
                | CVE-2024-50248 | In the Linux kernel, the following vulnerability has been resolved:  ntfs3: Add bounds checking to mi_enum_attr()  Added bounds checking to make sure | 
                
                | CVE-2025-21701 | In the Linux kernel, the following vulnerability has been resolved:  net: avoid race between device unregistration and ethnl ops  The following trace | 
                
                | CVE-2024-57798 | In the Linux kernel, the following vulnerability has been resolved:  drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()  W | 
                
                | CVE-2024-56672 | In the Linux kernel, the following vulnerability has been resolved:  blk-cgroup: Fix UAF in blkcg_unpin_online()  blkcg_unpin_online() walks up the b | 
                
                | CVE-2024-56658 | In the Linux kernel, the following vulnerability has been resolved:  net: defer final 'struct net' free in netns dismantle  Ilya reported a slab-use- | 
                
                | CVE-2024-56598 | In the Linux kernel, the following vulnerability has been resolved:  jfs: array-index-out-of-bounds fix in dtReadFirst  The value of stbl can be some | 
                
                | CVE-2024-56595 | In the Linux kernel, the following vulnerability has been resolved:  jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree  When the val | 
                
                | CVE-2024-53140 | In the Linux kernel, the following vulnerability has been resolved:  netlink: terminate outstanding dump on socket close  Netlink supports iterative | 
                
                | CVE-2024-53063 | In the Linux kernel, the following vulnerability has been resolved:  media: dvbdev: prevent the risk of out of memory access  The dvbdev contains a s | 
                
                | CVE-2024-50302 | In the Linux kernel, the following vulnerability has been resolved:  HID: core: zero-initialize the report buffer  Since the report buffer is used by |