TASK COMMIT
bugzilla: #I95ATO:CVE-2023-52567 ff94ad2d3fe6 serial: 8250_port: Check IRQ data before use
bugzilla: #I95ASP:CVE-2023-52530 a0f4ae6ccee4 wifi: mac80211: fix potential key use-after-free
bugzilla: #I987V5:Backport 5.10.198 LTS patches from upstream 7d9c6bcc12a9 RDMA/siw: Fix connection failure handling
bugzilla: #I95AT0:CVE-2023-52504 4ad3496f1696 x86/alternatives: Disable KASAN in apply_alternatives()
bugzilla: #I95AT9:CVE-2023-52575 6bade84e1182 x86/srso: Fix SBPB enablement for spec_rstack_overflow=off
bugzilla: #I956G4:CVE-2021-47070 4f1b4379b9ab uio_hv_generic: Fix another memory leak in error handling paths
bugzilla: #I95ATF:CVE-2023-52561 617ebe40e951 arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved
bugzilla: #I956G4:CVE-2021-47070 c61792f4bcfd uio_hv_generic: Fix another memory leak in error handling paths
bugzilla: #I9AWJ5:Backport 5.10.199 LTS patches from upstream fa3f95d441d1 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session
bugzilla: #I96G7W:CVE-2023-52594 c772db388685 wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
bugzilla: #I9BBFQ:【OLK-5.10】【SAS】跑FIO,概率触发watchdog的soft lockup,性能下降 b4972783807d scsi: hisi_sas: Add cond_resched() to cq_thread_v3_hw()
800790e21697 scsi: hisi_sas: Default enable interrupt coalescing
bugzilla: #I95AUA:CVE-2023-52572 10f1cab69242 cifs: Fix UAF in cifs_demultiplex_thread()
bugzilla: #I9E6TS:CVE-2024-26810 3a3e01ccaf86 vfio/pci: Lock external INTx masking ops
bugzilla: #I95RDW:CVE-2021-47101 eb1895851e01 asix: fix wrong return value in asix_check_host_enable()
9e685f5f99b1 asix: fix uninit-value in asix_mdio_read()
a859379e69a3 net: asix: fix uninit value bugs
bugzilla: #I96G8W:CVE-2023-52587 e0192117d863 IB/ipoib: Fix mcast list locking
da54f8bd03aa RDMA/IPoIB: Fix error code return in ipoib_mcast_join
bugzilla: #I9E6TU:CVE-2024-27437 ec7e61c775ee vfio/pci: Disable auto-enable of exclusive INTx IRQ
bugzilla: #I9E2GU:CVE-2024-26698 919e99cffd32 hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
bugzilla: #I95ATG:CVE-2023-52560 2a7f3da432bc mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()
bugzilla: #I96GPO:CVE-2023-52597 b32e901edf83 KVM: s390: fix setting of fpc register
bugzilla: #I95ATV:CVE-2023-52578 ae4d7191e99f net: fix kabi check warning
0bb1fcd2a746 net: Fix unwanted sign extension in netdev_stats_to_stats64()
91f3337da963 net: bridge: use DEV_STATS_INC()
a7086533dd34 net: add atomic_long_t to net_device_stats fields
bugzilla: #I95ATZ:CVE-2023-52574 36347ebe6eb5 team: fix null-ptr-deref when team device type is changed
bugzilla: #I96GO9:CVE-2023-52595 9a6b6b6b5dc9 wifi: rt2x00: restart beacon queue when hardware reset
bugzilla: #I9DO1Z:CVE-2024-26656 e41a98148c9d drm/amdgpu: fix use-after-free bug
bugzilla: #I95AXL:CVE-2023-52516 8caf6e23f8cf dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock
bugzilla: #I93EBW:CVE-2023-52464 0dc7df31196e EDAC/thunderx: Fix possible out-of-bounds string access
bugzilla: #I9E2M2:CVE-2024-26759 9991b30a69e6 mm/swap: fix race when skipping swapcache
bugzilla: #I9E2O0:CVE-2024-26751 8331bd0e8d15 ARM: ep93xx: Add terminator to gpiod_lookup_table
bugzilla: #I9E2Y8:CVE-2024-26778 cdf6d7176355 fbdev: savage: Error out if pixclock equals zero
bugzilla: #I9E2MF:CVE-2024-26772 148c854caa08 ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
bugzilla: #I9E2O5:CVE-2023-52640 82b207409184 fs/ntfs3: Fix oob in ntfs_listxattr
dc871e9a37ee fs/ntfs3: fix panic about slab-out-of-bounds caused by ntfs_list_ea()
2710142f1b91 ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()
bugzilla: #I9E2FM:CVE-2024-26695 ff9fff1301ea crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
bugzilla: #I9E3E9:CVE-2024-26736 1b00a40be774 afs: Increase buffer size in afs_update_volume_status()
bugzilla: #I9E2MG:CVE-2024-26777 3c6fc68c1a00 fbdev: sis: Error out if pixclock equals zero
bugzilla: #I9F351:修复CVE-2024-26598修复补丁修改错误 a2db63f28fe5 KVM: arm64: vgic-its: Fix CVE-2024-26598 fix patch issue
bugzilla: #I96G7Q:CVE-2023-52598 7b153f72d314 s390/ptrace: handle setting of fpc register correctly
bugzilla: #I9EEIG:smmu_v3 ecmdq代码逻辑存在问题 316adf4917bf iommu/arm-smmu-v3: fix using uninitialized or unchecked symbol
bugzilla: #I9E2MP:CVE-2024-26771 92c174fc433b dmaengine: ti: edma: Add some null pointer checks to the edma_probe
bugzilla: #I95B3Q:CVE-2023-52503 7c1c67b4a9c3e6e8353913e9308c093e019a3458 tee: amdtee: fix use-after-free vulnerability in amdtee_close_session