In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TPprintk UAF The commit afd2627f727b ("tracing: Check "%s" dereference via the field and not the TPprintk format") exposes potential UAFs in the xebomove trace event. Fix those by avoiding dereferencing the xememtypetoname[] array at TP_printk time. Since some code refactoring has taken place, explicit backporting may be needed for kernels older than 6.10.