TASK COMMIT
bugzilla: #IAGEN5:CVE-2024-41027 efeef0fc8c32 Fix userfaultfd_api to return EINVAL as expected
2153f4027b13 mm/userfaultfd: fail uffd-wp registration if not supported
bugzilla: #IAGEP3:CVE-2024-42089 9bc13b598b0e ASoC: fsl-asoc-card: set priv->pdev before using it
bugzilla: #IAGTJ2:CVE-2024-42124 7b8771e5d805 scsi: qedf: Make qedf_execute_tmf() non-preemptible
bugzilla: #IAGEPB:CVE-2024-42093 a156825cbe70 net/dpaa2: Avoid explicit cpumask var allocation on stack
bugzilla: #IAH97R:CVE-2023-52888 fff6bf4eb1ee media: mediatek: vcodec: Only free buffer VA that is not NULL
bugzilla: #IAGS16:CVE-2024-42160 f5de96f3877c f2fs: Add inline to f2fs_build_fault_attr() stub
a746e7a6d50d f2fs: check validation of fault attrs in f2fs_build_fault_attr()
bugzilla: #IAGEOW:CVE-2024-42084 dbb071bac419 ftruncate: pass a signed offset
bugzilla: #IAGRP3:CVE-2024-42161 27a3736e83d9 bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
bugzilla: #IAGS04:CVE-2024-42101 85ab853e7df8 drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
bugzilla: #IAGEMT:CVE-2024-41079 6ce9dccfe4c9 nvmet: always initialize cqe.result
bugzilla: #IAGEP9:CVE-2024-42094 6f80f3d5652e net/iucv: Avoid explicit cpumask var allocation on stack
bugzilla: #IACS4Z:CVE-2024-39497 b36f0f358310 drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
bugzilla: #IAGRY7:CVE-2024-42162 6b7b80c74a3d gve: Account for stopped queues when reading NIC stats
bugzilla: #IAGS4V:CVE-2024-42129 94d443bb54d6 leds: mlxreg: Use devm_mutex_init() for mutex initialization
6b45ef0adbc8 locking/mutex: Introduce devm_mutex_init()
bugzilla: #IA6SGI:CVE-2024-38546 563dd008174d drm: vc4: Fix possible null pointer dereference
bugzilla: #IAGEON:CVE-2024-41089 3a19e37d515b drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
bugzilla: #IACZYN:CVE-2024-40910 ea0a4d8a7f71 ax25: Fix refcount imbalance on inbound connections
bugzilla: #IAGENQ:CVE-2024-42077 6aa70547fb64 ocfs2: fix DIO failure due to insufficient transaction credits
bugzilla: #IAGEP8:CVE-2024-42092 f56c03223e4c gpio: davinci: Validate the obtained number of IRQs
bugzilla: #IAGEOP:CVE-2024-42076 520758d1b1e6 net: can: j1939: Initialize unused data in j1939_send_one()
69e4ebd73e04 can: j1939: j1939_send_one(): fix missing CAN header initialization
bugzilla: #IAGEK1:CVE-2024-41062 c6afac9cf621 Bluetooth: L2CAP: Fix deadlock
217df4f96d42 bluetooth/l2cap: sync sock recv cb and release
bugzilla: #IAG8UD:CVE-2024-41013 9eb4868ce0f1 xfs: don't walk off the end of a directory data block
bugzilla: #IAGEKF:CVE-2024-41070 2f7deea6db16 KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()
bugzilla: #IAGEN4:CVE-2024-41023 93a561f96f13 sched/deadline: Fix task_struct reference leak
bugzilla: #IAG8QA:CVE-2024-41014 162b6971fd94 xfs: add bounds checking to xlog_recover_process_data
bugzilla: #IAGEP4:CVE-2024-42090 867d18b8f25f pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
bugzilla: #IAGEOL:CVE-2024-41097 3423993bd87d usb: atm: cxacru: fix endpoint checking in cxacru_bind()
bugzilla: #IAGPRU:CVE-2024-42106 be00ff19f2ba inet_diag: Initialize pad field in struct inet_diag_req_v2
bugzilla: #IAGEOR:CVE-2024-42080 5489364c3ac3 RDMA/restrack: Fix potential invalid address access
bugzilla: #IAGSOT:CVE-2024-42224 03eaf7943222 net: dsa: mv88e6xxx: Correct check for empty list
bugzilla: #IAGTIZ:CVE-2024-42155 e21e44fa86ea s390/pkey: Wipe copies of protected- and secure-keys
bugzilla: #IAGSG3:CVE-2024-42105 036104fc9aed nilfs2: fix inode number range checks
bugzilla: #IAGEN2:CVE-2024-41044 f913ee2b70ac ppp: reject claimed-as-LCP but actually malformed packets
bugzilla: #IAGELZ:CVE-2024-41072 f903680a4da9 wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
bugzilla: #IAGSPA:CVE-2024-42145 5e5e9746ff26 IB/core: Implement a limit on UMAD receive List
bugzilla: #IAGEM4:CVE-2024-41048 64d3f6f51857 skmsg: Skip zero length skb in sk_msg_recvmsg
bugzilla: #IAGENG:CVE-2024-42082 2ee663a8e07e xdp: xdp_mem_allocator can be NULL in trace_mem_connect().
aa751f977a6e xdp: Remove WARN() from __xdp_reg_mem_model()
eb8fdc3bd177 xdp: Allow registering memory model without rxq reference
5403073dfd04 xdp: Move the rxq_info.mem clearing to unreg_mem_model()
bugzilla: #IAGEKE:CVE-2024-41046 3e606528a559 net: ethernet: lantiq_etop: fix double free in detach
36dd4847bd6a net: lantiq_etop: add blank line after declaration
bugzilla: #IAGEMQ:CVE-2024-41081 c037fde91c36 ila: block BH in ila_output()
bugzilla: #IAH95F:CVE-2023-52887 ef9d5cab3d9e net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new
bugzilla: #IAGEF4:CVE-2024-41020 d985fcea5d18 filelock: Fix fcntl/close race recovery compat path
bugzilla: #IAG8ZG:CVE-2024-41090 c8e7ff9b436f tap: add missing verification for short frame
bugzilla: #IAD0KR:CVE-2024-40961 e81a1e86c9d6 ipv6: prevent possible NULL deref in fib6_nh_init()
bugzilla: #IAHA5K:【openEuler-22.03-LTS-SP1】backport serveral bugfixes for bpf from upstream 9ef40511f410 bpf, events: Use prog to emit ksymbol event for main program
8f97cc1bd5bf bpf, perf: Use subprog name when reporting subprog ksymbol
bugzilla: #IAGEOM:CVE-2024-42068 ac14bb37df2e bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
bugzilla: #IAHA5K:【openEuler-22.03-LTS-SP1】backport serveral bugfixes for bpf from upstream 254c8a3cc27a bpf: ensure main program has an extable
bugzilla: #IAGELJ:CVE-2024-41064 c1c29fcb02b5 powerpc/eeh: avoid possible crash when edev->pdev changes
bugzilla: #IAGEN8:CVE-2024-41063 17057a180cb2 Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
bugzilla: #IA7D3T:CVE-2024-38627 f7514debd9bf stm class: Fix a double free in stm_register_device()
bugzilla: #IAGEP7:CVE-2024-42097 99eaf13ab2fa ALSA: emux: improve patch ioctl data validation
bugzilla: #IAD028:CVE-2024-40982 ba20c92456f5 ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
bugzilla: #IAG8V2:CVE-2024-41091 e20e6335efc1 tun: add missing verification for short frame
bugzilla: #IA8AED:CVE-2024-39471 01b5efb37847 drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()
23696b51b8d7 drm/amdgpu: add error handle to avoid out-of-bounds
bugzilla: #IAGEMW:CVE-2024-41077 b31f91f701b7 null_blk: fix validation of block size
bugzilla: #IAGS1R:CVE-2024-42115 02569076b23e jffs2: Fix potential illegal address access in jffs2_free_inode
bugzilla: #IAGEK8:CVE-2024-41080 bca1a8acce91 io_uring: fix possible deadlock in io_register_iowq_max_workers()
bugzilla: #IAG8RW:CVE-2024-41019 c9bcbf89613c fs/ntfs3: Validate ff offset
bugzilla: #IAGEKL:CVE-2024-41041 fd83a7b003de udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().
bugzilla: #IAGSW7:CVE-2024-42228 1b244ee4a81d drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
bugzilla: #IAGEOZ:CVE-2024-42086 9527a5736a38 iio: chemical: bme680: Fix overflows in compensate() functions
bugzilla: #I9DZOS:Backport 5.10.202 LTS patches from upstream f1ae64335ba5 media: gspca: cpia1: shift-out-of-bounds in set_flicker
bugzilla: #I9Q9ID:CVE-2023-52674 0f54ce8d00c2 ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()
bugzilla: #I9QG73:CVE-2024-35904 e04c832c0bc2 selinux: avoid dereference of garbage after mount failure
bugzilla: #IACR1V:CVE-2024-40988 40ac13dacd7b drm/radeon: fix UBSAN warning in kv_dpm.c
bugzilla: #IA6SDW:CVE-2024-38561 e01a173cbfe5 kunit: Fix kthread reference
12be8ed9a400 kunit: Fix kthread reference
bugzilla: #IAEDJI:【OLK-5.10】 FSC = 0x21: alignment fault 0973ef317fb2 PCI/ROM: Fix PCI ROM header check bug
bugzilla: #IAD0D8:CVE-2024-40959 489c6e2edbd3 xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
bugzilla: #IAGELE:CVE-2024-41069 ecc103a9556f ASoC: topology: Fix route memory corruption
592066a2d853 ASoC: topology: Fix references to freed memory
bugzilla: #IACV6I:CVE-2024-40976 84a7cafed777 drm/lima: mask irqs in timeout path before hard reset
dafaa0bf0fe0 drm/lima: add mask irq callback to gp and pp
bugzilla: #IAD00R:CVE-2024-39509 4924badfcfd2 HID: core: remove unnecessary WARN_ON() in implement()
bugzilla: #I9R4P3:CVE-2021-47382 a1d51629643c s390/qeth: fix deadlock during failing recovery
bugzilla: #IAGEM2:CVE-2024-41040 1a2d17c8c59e net/sched: Fix UAF when resolving a clash
bugzilla: #IACS9I:CVE-2024-40999 391704d5a654 net: ena: Add validation for completion descriptors consistency
bugzilla: #IA6S5U:CVE-2024-38594 9203e995d9fe net: stmmac: move the EST lock to struct stmmac_priv

| bugzilla: #I9R4M7:CVE-2023-52764 | f1ae64335ba502ac6f169a9688a6b956ffd59b47 media: gspca: cpia1: shift-out-of-bounds in set_flicker |
| bugzilla: #IAGEF5:CVE-2024-41022 | 01b5efb37847231e24918846c4aed8622a80966c drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() |
| bugzilla: #IAGSC9:CVE-2024-42105 | 036104fc9aedfefc96b098b7ca3a0b269fe4b923 nilfs2: fix inode number range checks |