Package "linux-nvidia-tegra-igx"
| Name: |
linux-nvidia-tegra-igx
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Linux kernel version specific cloud tools for version 5.15.0
- Header files related to Linux kernel version 5.15.0
- Header files related to Linux kernel version 5.15.0
- Header files related to Linux kernel version 5.15.0
|
| Latest version: |
5.15.0-1039.39 |
| Release: |
jammy (22.04) |
| Level: |
security |
| Repository: |
main |
Links
Other versions of "linux-nvidia-tegra-igx" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
|
linux-nvidia-tegra-igx (5.15.0-1039.39) jammy; urgency=medium
* jammy/linux-nvidia-tegra-igx: 5.15.0-1039.39 -proposed tracker (LP: #2131397)
[ Ubuntu-nvidia-tegra: 5.15.0-1050.50 ]
* jammy/linux-nvidia-tegra: 5.15.0-1050.50 -proposed tracker (LP: #2131399)
[ Ubuntu-realtime: 5.15.0-1097.106 ]
* jammy/linux-realtime: 5.15.0-1097.106 -proposed tracker (LP: #2131403)
[ Ubuntu: 5.15.0-164.174 ]
* jammy/linux: 5.15.0-164.174 -proposed tracker (LP: #2131429)
* CVE-2024-53218
- f2fs: fix race in concurrent f2fs_stop_gc_thread
* CVE-2024-47691
- f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()
* CVE-2025-39993
- media: rc: fix races with imon_disconnect()
* i40e driver is triggering VF resets on every link state change
(LP: #2130552)
- i40e: avoid redundant VF link state updates
* CVE-2025-40018
- ipvs: Defer ip_vs_ftp unregister during netns cleanup
* CVE-2025-21855
- ibmvnic: Don't reference skb after sending to VIOS
* CVE-2024-50067
- uprobes: encapsulate preparation of uprobe args buffer
- uprobe: avoid out-of-bounds memory access of fetching args
* CVE-2024-53090
- afs: Fix lock recursion
* CVE-2025-39964
- crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
- crypto: af_alg - Fix incorrect boolean values in af_alg_ctx
* CVE-2022-49390
- macsec: fix UAF bug for real_dev
-- Abdur Rahman <email address hidden> Fri, 28 Nov 2025 11:19:39 -0500
|
| Source diff to previous version |
| 2130552 |
i40e driver is triggering VF resets on every link state change |
| CVE-2024-53218 |
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix race in concurrent f2fs_stop_gc_thread In my test case, concurrent ca |
| CVE-2024-47691 |
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() syzbot reports a f2f |
| CVE-2025-39993 |
In the Linux kernel, the following vulnerability has been resolved: media: rc: fix races with imon_disconnect() Syzbot reports a KASAN issue as bel |
| CVE-2025-40018 |
In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path |
| CVE-2025-21855 |
In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successful |
| CVE-2024-50067 |
In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetc |
| CVE-2024-53090 |
In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion afs_wake_up_async_call() can incur lock recursion. The |
| CVE-2025-39964 |
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg Issuing two write |
| CVE-2022-49390 |
In the Linux kernel, the following vulnerability has been resolved: macsec: fix UAF bug for real_dev Create a new macsec device but not get referen |
|
|
linux-nvidia-tegra-igx (5.15.0-1038.38) jammy; urgency=medium
* jammy/linux-nvidia-tegra-igx: 5.15.0-1038.38 -proposed tracker (LP: #2127540)
* Packaging resync (LP: #1786013)
- [Packaging] nvidia-tegra-igx: Remove dwarfdump from Build-Depends
[ Ubuntu-nvidia-tegra: 5.15.0-1049.49 ]
* jammy/linux-nvidia-tegra: 5.15.0-1049.49 -proposed tracker (LP: #2127542)
[ Ubuntu-realtime: 5.15.0-1096.105 ]
* jammy/linux-realtime: 5.15.0-1096.105 -proposed tracker (LP: #2127546)
* Jammy real-time patch set update: v5.15.193-rt89 (LP: #2130278)
- rcu/tree: Protect rcu_rdp_is_offloaded() invocations on RT
- sched: Introduce migratable()
- arm64: mm: Make arch_faults_on_old_pte() check for migratability
- printk: rename printk cpulock API and always disable interrupts
- console: add write_atomic interface
- kdb: only use atomic consoles for output mirroring
- serial: 8250: implement write_atomic
- printk: relocate printk_delay()
- printk: call boot_delay_msec() in printk_delay()
- printk: use seqcount_latch for console_seq
- printk: introduce kernel sync mode
- printk: move console printing to kthreads
- printk: add console handover
- printk: add pr_flush()
- printk: Enhance the condition check of msleep in pr_flush()
- sched: Switch wait_task_inactive to HRTIMER_MODE_REL_HARD
- kthread: Move prio/affinite change into the newly created thread
- genirq: Move prio assignment into the newly created thread
- genirq: Disable irqfixup/poll on PREEMPT_RT.
- efi: Allow efi=runtime
- mm: Disable zsmalloc on PREEMPT_RT
- net/core: disable NET_RX_BUSY_POLL on PREEMPT_RT
- samples/kfifo: Rename read_lock/write_lock
- crypto: testmgr - Only disable migration in
crypto_disable_simd_for_test()
- mm: Allow only SLUB on PREEMPT_RT
- mm: page_alloc: Use migrate_disable() in drain_local_pages_wq()
- mm/scatterlist: Replace the !preemptible warning in sg_miter_stop()
- mm: Disable NUMA_BALANCING_DEFAULT_ENABLED and TRANSPARENT_HUGEPAGE on
PREEMPT_RT
- x86/softirq: Disable softirq stacks on PREEMPT_RT
- Documentation/kcov: Include types.h in the example.
- Documentation/kcov: Define `ip' in the example.
- kcov: Allocate per-CPU memory on the relevant node.
- kcov: Avoid enable+disable interrupts if !in_task().
- kcov: Replace local_irq_save() with a local_lock_t.
- gen_stats: Add instead Set the value in __gnet_stats_copy_basic().
- gen_stats: Add gnet_stats_add_queue().
- mq, mqprio: Use gnet_stats_add_queue().
- gen_stats: Move remaining users to gnet_stats_add_queue().
- u64_stats: Introduce u64_stats_set()
- net: sched: Protect Qdisc::bstats with u64_stats
- net: sched: Use _bstats_update/set() instead of raw writes
- net: sched: Merge Qdisc::bstats and Qdisc::cpu_bstats data types
- net: sched: Remove Qdisc::running sequence counter
- net: sched: Allow statistics reads from softirq.
- net: sched: fix logic error in qdisc_run_begin()
- net: sched: remove one pair of atomic operations
- net: stats: Read the statistics in ___gnet_stats_copy_basic() instead of
adding.
- net: sched: gred: dynamically allocate tc_gred_qopt_offload
- sched/rt: Annotate the RT balancing logic irqwork as IRQ_WORK_HARD_IRQ
- irq_work: Allow irq_work_sync() to sleep if irq_work() no IRQ support.
- irq_work: Handle some irq_work in a per-CPU thread on PREEMPT_RT
- irq_work: Also rcuwait for !IRQ_WORK_HARD_IRQ on PREEMPT_RT
- irq_poll: Use raise_softirq_irqoff() in cpu_dead notifier
- smp: Wake ksoftirqd on PREEMPT_RT instead do_softirq().
- fs/namespace: Boost the mount_lock.lock owner instead of spinning on
PREEMPT_RT.
- fscache: Use only one fscache_object_cong_wait.
- sched: Clean up the might_sleep() underscore zoo
- sched: Make cond_resched_*lock() variants consistent vs. might_sleep()
- sched: Remove preempt_offset argument from __might_sleep()
- sched: Cleanup might_sleep() printks
- sched: Make might_sleep() output less confusing
- sched: Make RCU nest depth distinct in __might_resched()
- sched: Make cond_resched_lock() variants RT aware
- locking/rt: Take RCU nesting into account for __might_resched()
- sched: Limit the number of task migrations per batch on RT
- sched: Disable TTWU_QUEUE on RT
- sched: Move kprobes cleanup out of finish_task_switch()
- sched: Delay task stack freeing on RT
- sched: Move mmdrop to RCU on RT
- cgroup: use irqsave in cgroup_rstat_flush_locked()
- mm: workingset: replace IRQ-off check with a lockdep assert.
- jump-label: disable if stop_machine() is used
- locking: Remove rt_rwlock_is_contended()
- lockdep/selftests: Avoid using local_lock_{acquire|release}().
- sched: Trigger warning if ->migration_disabled counter underflows.
- rtmutex: Add a special case for ww-mutex handling.
- rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable().
- lockdep: Make it RT aware
- lockdep/selftests: Add rtmutex to the last column
- lockdep/selftests: Unbalanced migrate_disable() & rcu_read_lock()
- lockdep/selftests: Skip the softirq related tests on PREEMPT_RT
- lockdep/selftests: Adapt ww-tests for PREEMPT_RT
- locking: Allow to include asm/spinlock_types.h from
linux/spinlock_types_raw.h
- sched: Make preempt_enable_no_resched() behave like preempt_enable() on
PREEMPT_RT
- kernel/sched: add {put|get}_cpu_light()
- block/mq: do not invoke preempt_disable()
- md: raid5: Make raid5_percpu handling RT aware
- scsi/fcoe: Make RT aware.
- mm/vmalloc: Another preempt disable region which sucks
- net: Remove preemption disabling in netif_rx()
- sunrpc: Make svc_xprt_do_enqueue() use get_cpu_light()
- softirq: Check preemption after reenabling interrupts
- mm/memcontrol: Disable on PRE
|
| Source diff to previous version |
| 1786013 |
Packaging resync |
| 2130278 |
Jammy real-time patch set update: v5.15.193-rt89 |
| 2126659 |
Add pvpanic kernel modules to linux-modules |
| 2123815 |
Ubuntu 24.04.2: error in audit_log_object_context keep printing in the kernel and console |
| 2125142 |
Hung task when heavily accessing kernfs files |
| 2125444 |
ensure mptcp keepalives are honored when set |
| 2125053 |
UBUNTU: fan: fail to check kmalloc() return could cause a NULL pointer dereference |
| 2127112 |
Jammy update: v5.15.193 upstream stable release |
| 2126782 |
Jammy update: v5.15.192 upstream stable release |
| 2125626 |
Jammy update: v5.15.191 upstream stable release |
| 2122364 |
Jammy update: v5.15.190 upstream stable release |
| 2127864 |
UBUNTU: SAUCE: Revert \ |
| 2124105 |
VMSCAPE CVE-2025-40300 |
| CVE-2024-50047 |
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in async decryption Doing an async decryption (large read) |
| CVE-2024-50061 |
In the Linux kernel, the following vulnerability has been resolved: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Du |
| CVE-2023-53074 |
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini The call trace occurs w |
| CVE-2025-38678 |
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject duplicate device on updates A chain/flowtable upda |
| CVE-2024-53068 |
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() The scmi_dev |
| CVE-2025-40300 |
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex |
|
|
linux-nvidia-tegra-igx (5.15.0-1037.37) jammy; urgency=medium
* jammy/linux-nvidia-tegra-igx: 5.15.0-1037.37 -proposed tracker (LP: #2127357)
[ Ubuntu-nvidia-tegra: 5.15.0-1048.48 ]
* jammy/linux-nvidia-tegra: 5.15.0-1048.48 -proposed tracker (LP: #2127359)
[ Ubuntu-realtime: 5.15.0-1095.104 ]
* jammy/linux-realtime: 5.15.0-1095.104 -proposed tracker (LP: #2127363)
[ Ubuntu: 5.15.0-161.171 ]
* jammy/linux: 5.15.0-161.171 -proposed tracker (LP: #2127389)
* VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300
- Documentation/hw-vuln: Add VMSCAPE documentation
- x86/vmscape: Enumerate VMSCAPE bug
- x86/vmscape: Add conditional IBPB mitigation
- x86/vmscape: Enable the mitigation
- x86/bugs: Move cpu_bugs_smt_update() down
- x86/vmscape: Warn when STIBP is disabled with SMT
- x86/vmscape: Add old Intel CPUs to affected list
* VMSCAPE CVE-2025-40300 (LP: #2124105)
- [Config] Enable MITIGATION_VMSCAPE config
-- Abdur Rahman <email address hidden> Mon, 20 Oct 2025 13:22:27 -0400
|
| Source diff to previous version |
| 2124105 |
VMSCAPE CVE-2025-40300 |
| CVE-2025-40300 |
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex |
|
|
linux-nvidia-tegra-igx (5.15.0-1036.36) jammy; urgency=medium
* jammy/linux-nvidia-tegra-igx: 5.15.0-1036.36 -proposed tracker (LP: #2126516)
* tegra-tests devices check fails due to ubuntu/defconfig config differences
(LP: #2125414)
- [Config] nvidia-tegra: Enable AQUANTIA_PHY to pass tegra-tests
[ Ubuntu-nvidia-tegra: 5.15.0-1047.47 ]
* jammy/linux-nvidia-tegra: 5.15.0-1047.47 -proposed tracker (LP: #2126518)
* sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] Don't generate list of source files
* tegra-tests devices check fails due to ubuntu/defconfig config differences
(LP: #2125414)
- [Config] nvidia-tegra: Enable AQUANTIA_PHY to pass tegra-tests
- [Config] nvidia-tegra: Enable HTE to pass tegra-tests
* apply NVIDIA patches August 22, 2025 (LP: #2121252)
- NVIDIA: SAUCE: phy: tegra: xusb: Fix unbalanced regulator disable in
UTMI PHY mode
- NVIDIA: SAUCE: aquantia: unset and restore aneg intr to suspend
- NVIDIA: SAUCE: bpmp: changes to fix sleep in atomic context.
- NVIDIA: SAUCE: i2c: tegra: Do not mark ACPI devices and PREEMPT_RT as
irq safe
- NVIDIA: SAUCE: arm64: configs: set CONFIG_SQUASHFS_XATTR
- NVIDIA: SAUCE: mm: Export mm_trace_rss_stat function
[ Ubuntu-realtime: 5.15.0-1094.103 ]
* jammy/linux-realtime: 5.15.0-1094.103 -proposed tracker (LP: #2126522)
* sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] Don't generate list of source files
[ Ubuntu: 5.15.0-160.170 ]
* jammy/linux: 5.15.0-160.170 -proposed tracker (LP: #2126548)
* [Regression Updates] System hangs when loading audit rules
(5.15.0-156.166) (LP: #2126434)
- netlink: avoid infinite retry looping in netlink_unicast()
[ Ubuntu: 5.15.0-158.168 ]
* jammy/linux: 5.15.0-158.168 -proposed tracker (LP: #2124104)
* [UBUNTU 22.04] s390/pci: Handle PCI error codes other than 0x3a
(LP: #2120344)
- s390/pci: Handle PCI error codes other than 0x3a
* sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] Don't generate list of source files
* CVE-2024-26700
- drm/amd/display: Fix MST Null Ptr for RV
* CVE-2023-52593
- wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
- wifi: wfx: fix memory leak when starting AP
- wifi: wfx: repair open network AP mode
* CVE-2025-38477
- net/sched: sch_qfq: Fix race condition on qfq_aggregate
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class
* CVE-2025-38617
- net/packet: fix a race in packet_set_ring() and packet_notifier()
* CVE-2025-38618
- vsock: Do not allow binding to VMADDR_PORT_ANY
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
-- Abdur Rahman <email address hidden> Tue, 07 Oct 2025 16:47:43 -0400
|
| Source diff to previous version |
| 2125414 |
tegra-tests devices check fails due to ubuntu/defconfig config differences |
| 2104911 |
sources list generation using dwarfdump takes up to 0.5hr in build process |
| 2121252 |
apply NVIDIA patches August 22, 2025 |
| 2126434 |
[Regression Updates] System hangs when loading audit rules (5.15.0-156.166) |
| 2120344 |
[UBUNTU 22.04] s390/pci: Handle PCI error codes other than 0x3a |
| 1786013 |
Packaging resync |
| CVE-2024-26700 |
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix MST Null Ptr for RV The change try to fix below error spec |
| CVE-2023-52593 |
In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() Since 'iee |
| CVE-2025-38477 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc |
| CVE-2025-38617 |
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s |
| CVE-2025-38618 |
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au |
|
|
linux-nvidia-tegra-igx (5.15.0-1035.35) jammy; urgency=medium
* jammy/linux-nvidia-tegra-igx: 5.15.0-1035.35 -proposed tracker (LP: #2123979)
[ Ubuntu-nvidia-tegra: 5.15.0-1046.46 ]
* jammy/linux-nvidia-tegra: 5.15.0-1046.46 -proposed tracker (LP: #2123981)
[ Ubuntu-realtime: 5.15.0-1093.102 ]
* jammy/linux-realtime: 5.15.0-1093.102 -proposed tracker (LP: #2123985)
[ Ubuntu: 5.15.0-157.167 ]
* jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)
* Packaging resync (LP: #1786013)
- [Packaging] resync git-ubuntu-log
* CVE-2025-38477
- net/sched: sch_qfq: Fix race condition on qfq_aggregate
- net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class
* CVE-2025-38617
- net/packet: fix a race in packet_set_ring() and packet_notifier()
* CVE-2025-38618
- vsock: Do not allow binding to VMADDR_PORT_ANY
-- Abdur Rahman <email address hidden> Fri, 26 Sep 2025 11:28:49 -0400
|
| 1786013 |
Packaging resync |
| CVE-2025-38477 |
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc |
| CVE-2025-38617 |
In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s |
| CVE-2025-38618 |
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au |
|
About
-
Send Feedback to @ubuntu_updates