UbuntuUpdates.org

Package "linux-nvidia-tegra-headers-5.15.0-1048"

Name: linux-nvidia-tegra-headers-5.15.0-1048

Description:

Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1048.48
Release: jammy (22.04)
Level: security
Repository: universe
Head package: linux-nvidia-tegra

Links


Download "linux-nvidia-tegra-headers-5.15.0-1048"


Other versions of "linux-nvidia-tegra-headers-5.15.0-1048" in Jammy

Repository Area Version
updates universe 5.15.0-1048.48

Changelog

Version: 5.15.0-1048.48 2025-11-06 20:07:36 UTC

  linux-nvidia-tegra (5.15.0-1048.48) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1048.48 -proposed tracker (LP: #2127359)

  [ Ubuntu-realtime: 5.15.0-1095.104 ]

  * jammy/linux-realtime: 5.15.0-1095.104 -proposed tracker (LP: #2127363)
  [ Ubuntu: 5.15.0-161.171 ]
  * jammy/linux: 5.15.0-161.171 -proposed tracker (LP: #2127389)
  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300
    - Documentation/hw-vuln: Add VMSCAPE documentation
    - x86/vmscape: Enumerate VMSCAPE bug
    - x86/vmscape: Add conditional IBPB mitigation
    - x86/vmscape: Enable the mitigation
    - x86/bugs: Move cpu_bugs_smt_update() down
    - x86/vmscape: Warn when STIBP is disabled with SMT
    - x86/vmscape: Add old Intel CPUs to affected list
  * VMSCAPE CVE-2025-40300 (LP: #2124105)
    - [Config] Enable MITIGATION_VMSCAPE config

 -- Noah Wager <email address hidden> Mon, 20 Oct 2025 07:27:28 -0700

Source diff to previous version
2124105 VMSCAPE CVE-2025-40300
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex

Version: 5.15.0-1047.47 2025-11-03 18:07:50 UTC

  linux-nvidia-tegra (5.15.0-1047.47) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1047.47 -proposed tracker (LP: #2126518)

  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] Don't generate list of source files

  * tegra-tests devices check fails due to ubuntu/defconfig config differences
    (LP: #2125414)
    - [Config] nvidia-tegra: Enable AQUANTIA_PHY to pass tegra-tests
    - [Config] nvidia-tegra: Enable HTE to pass tegra-tests

  * apply NVIDIA patches August 22, 2025 (LP: #2121252)
    - NVIDIA: SAUCE: phy: tegra: xusb: Fix unbalanced regulator disable in
      UTMI PHY mode
    - NVIDIA: SAUCE: aquantia: unset and restore aneg intr to suspend
    - NVIDIA: SAUCE: bpmp: changes to fix sleep in atomic context.
    - NVIDIA: SAUCE: i2c: tegra: Do not mark ACPI devices and PREEMPT_RT as
      irq safe
    - NVIDIA: SAUCE: arm64: configs: set CONFIG_SQUASHFS_XATTR
    - NVIDIA: SAUCE: mm: Export mm_trace_rss_stat function

  [ Ubuntu-realtime: 5.15.0-1094.103 ]

  * jammy/linux-realtime: 5.15.0-1094.103 -proposed tracker (LP: #2126522)
  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] Don't generate list of source files
  [ Ubuntu: 5.15.0-160.170 ]
  * jammy/linux: 5.15.0-160.170 -proposed tracker (LP: #2126548)
  * [Regression Updates] System hangs when loading audit rules
    (5.15.0-156.166) (LP: #2126434)
    - netlink: avoid infinite retry looping in netlink_unicast()
  [ Ubuntu: 5.15.0-158.168 ]
  * jammy/linux: 5.15.0-158.168 -proposed tracker (LP: #2124104)
  * [UBUNTU 22.04] s390/pci: Handle PCI error codes other than 0x3a
    (LP: #2120344)
    - s390/pci: Handle PCI error codes other than 0x3a
  * sources list generation using dwarfdump takes up to 0.5hr in build process
    (LP: #2104911)
    - [Packaging] Don't generate list of source files
  * CVE-2024-26700
    - drm/amd/display: Fix MST Null Ptr for RV
  * CVE-2023-52593
    - wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
    - wifi: wfx: fix memory leak when starting AP
    - wifi: wfx: repair open network AP mode
  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class
  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()
  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log

 -- Jacob Martin <email address hidden> Thu, 02 Oct 2025 17:51:48 -0500

Source diff to previous version
2104911 sources list generation using dwarfdump takes up to 0.5hr in build process
2125414 tegra-tests devices check fails due to ubuntu/defconfig config differences
2121252 apply NVIDIA patches August 22, 2025
2126434 [Regression Updates] System hangs when loading audit rules (5.15.0-156.166)
2120344 [UBUNTU 22.04] s390/pci: Handle PCI error codes other than 0x3a
1786013 Packaging resync
CVE-2024-26700 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix MST Null Ptr for RV The change try to fix below error spec
CVE-2023-52593 In the Linux kernel, the following vulnerability has been resolved: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() Since 'iee
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 5.15.0-1046.46 2025-10-01 20:07:36 UTC

  linux-nvidia-tegra (5.15.0-1046.46) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1046.46 -proposed tracker (LP: #2123981)

  [ Ubuntu-realtime: 5.15.0-1093.102 ]

  * jammy/linux-realtime: 5.15.0-1093.102 -proposed tracker (LP: #2123985)
  [ Ubuntu: 5.15.0-157.167 ]
  * jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class
  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()
  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY

 -- Noah Wager <email address hidden> Wed, 24 Sep 2025 15:56:20 -0600

Source diff to previous version
1786013 Packaging resync
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 5.15.0-1045.45 2025-09-25 01:07:04 UTC

  linux-nvidia-tegra (5.15.0-1045.45) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1045.45 -proposed tracker (LP: #2120069)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] debian.nvidia-tegra/dkms-versions -- update from kernel-
      versions (main/2025.08.11)

  [ Ubuntu-realtime: 5.15.0-1092.101 ]

  * jammy/linux-realtime: 5.15.0-1092.101 -proposed tracker (LP: #2120073)
  [ Ubuntu: 5.15.0-156.166 ]
  * jammy/linux: 5.15.0-156.166 -proposed tracker (LP: #2120207)
  * minimal kernel lacks modules for blk disk in arm64 openstack environments
    where config_drive is required (LP: #2118499)
    - [Config] Enable SYM53C8XX_2 on arm64
  [ Ubuntu: 5.15.0-154.164 ]
  * jammy/linux: 5.15.0-154.164 -proposed tracker (LP: #2120098)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.08.11)
  * warning at iommu_dma_unmap_page when running ibv_rc_pingpong
    (LP: #2107816)
    - RDMA/mlx5: Fix a WARN during dereg_mr for DM type
  * dmesg flooded with errors: amdgpu: DP AUX transfer fail:4 (LP: #2115238)
    - drm/amd/display: Avoid flooding unnecessary info messages
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995)
    - ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode
    - fix proc_sys_compare() handling of in-lookup dentries
    - vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also
      `transport_local`
    - net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap
    - net: phy: smsc: Fix link failure in forced mode with Auto-MDIX
    - atm: clip: Fix memory leak of struct clip_vcc.
    - ice: safer stats processing
    - rxrpc: Fix oops due to non-existence of prealloc backlog struct
    - bpf: fix precision backtracking instruction iteration
    - bpf, sockmap: Fix skb refcnt race after locking changes
    - xen: replace xen_remap() with memremap()
    - x86/mce/amd: Fix threshold limit reset
    - x86/mce: Don't remove sysfs if thresholding sysfs init fails
    - x86/mce: Make sure CMCI banks are cleared during shutdown on Intel
    - gre: Fix IPv6 multicast route creation.
    - pinctrl: qcom: msm: mark certain pins as invalid for interrupts
    - drm/sched: Increment job count before swapping tail spsc queue
    - drm/gem: Fix race in drm_gem_handle_create_tail()
    - Revert "ACPI: battery: negate current when discharging"
    - btrfs: propagate last_unlink_trans earlier when doing a rmdir
    - btrfs: use btrfs_record_snapshot_destroy() during rmdir
    - RDMA/mlx5: Fix vport loopback for MPV device
    - pwm: mediatek: Ensure to disable clocks in error path
    - netlink: Fix rmem check in netlink_broadcast_deliver().
    - netlink: make sure we allow at least one dump skb
    - xhci: Allow RPM on the USB controller (1022:43f7) by default
    - usb: xhci: quirk for data loss in ISOC transfers
    - xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS
    - Input: xpad - support Acer NGR 200 Controller
    - usb:cdnsp: remove TRB_FLUSH_ENDPOINT command
    - usb: cdnsp: Replace snprintf() with the safer scnprintf() variant
    - usb: cdnsp: Fix issue with CV Bad Descriptor test
    - usb: dwc3: Abort suspend on soft disconnect failure
    - dma-buf: add dma_resv_for_each_fence_unlocked v8
    - dma-buf: use new iterator in dma_resv_wait_timeout
    - dma-buf: fix timeout handling in dma_resv_wait_timeout v2
    - wifi: zd1211rw: Fix potential NULL pointer dereference in
      zd_mac_tx_to_dev()
    - smb: server: make use of rdma_destroy_qp()
    - ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()
    - net: appletalk: Fix device refcount leak in atrtr_create()
    - net: phy: microchip: limit 100M workaround to link-down events on
      LAN88xx
    - can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to
      debug level
    - net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()
    - bnxt_en: Fix DCB ETS validation
    - atm: idt77252: Add missing `dma_map_error()`
    - um: vector: Reduce stack usage in vector_eth_configure()
    - net: usb: qmi_wwan: add SIMCom 8230C composition
    - HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2
    - vt: add missing notification when switching back to text mode
    - HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY
    - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras
    - Input: atkbd - do not skip atkbd_deactivate() when skipping
      ATKBD_CMD_GETID
    - x86/mm: Disable hugetlb page table sharing on 32-bit
    - Linux 5.15.189
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38067
    - rseq: Fix segfault on registration when rseq_cs is non-zero
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38074
    - vhost-scsi: protect vq->log_used with vq->mutex
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38439
    - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38441
    - netfilter: flowtable: account for Ethernet header in
      nf_flow_pppoe_proto()
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38443
    - nbd: fix uaf in nbd_genl_connect() error path
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38444
    - raid10: cleanup memleak at raid10_make_request
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38445
    - md/raid1: Fix stack memory use after return in raid1_reshape
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38375
    - virtio-net: ensure the received length does not exceed allocated size
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38448
    - usb: gadget: u_ser

Source diff to previous version
1786013 Packaging resync
2118499 minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required
2107816 warning at iommu_dma_unmap_page when running ibv_rc_pingpong
2118995 Jammy update: v5.15.189 upstream stable release
2118993 Jammy update: v5.15.188 upstream stable release
2118977 Jammy update: v5.15.187 upstream stable release
2116904 Jammy update: v5.15.186 upstream stable release
2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2025-38067 In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field i
CVE-2025-38074 In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: protect vq->log_used with vq->mutex The vhost-scsi completion path
CVE-2025-38439 In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT When transmitting an XDP_
CVE-2025-38441 In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() syzb
CVE-2025-38443 In the Linux kernel, the following vulnerability has been resolved: nbd: fix uaf in nbd_genl_connect() error path There is a use-after-free issue i
CVE-2025-38444 In the Linux kernel, the following vulnerability has been resolved: raid10: cleanup memleak at raid10_make_request If raid10_read_request or raid10
CVE-2025-38445 In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_resha
CVE-2025-38375 In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_li
CVE-2025-38448 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix race condition in TTY wakeup A race condition occurs
CVE-2024-44939 In the Linux kernel, the following vulnerability has been resolved: jfs: fix null ptr deref in dtInsertEntry [syzbot reported] general protection f
CVE-2024-26775 In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of th
CVE-2022-48703 In the Linux kernel, the following vulnerability has been resolved: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR In s
CVE-2025-38457 In the Linux kernel, the following vulnerability has been resolved: net/sched: Abort __tc_modify_qdisc if parent class does not exist Lion's patch
CVE-2025-38458 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() atmarpd_dev_ops does n
CVE-2025-38459 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the spla
CVE-2025-38460 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected b
CVE-2025-38461 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload.
CVE-2025-38462 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_{g2h,h2g} TOCTOU vsock_find_cid() and vsock_dev_do_ioctl()
CVE-2025-38464 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_conn_close(). syzbot reported a null-ptr-deref
CVE-2025-38465 In the Linux kernel, the following vulnerability has been resolved: netlink: Fix wraparounds of sk->sk_rmem_alloc. Netlink has this pattern in some
CVE-2025-38466 In the Linux kernel, the following vulnerability has been resolved: perf: Revert to requiring CAP_SYS_ADMIN for uprobes Jann reports that uprobes c
CVE-2025-38467 In the Linux kernel, the following vulnerability has been resolved: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling If there's supp
CVE-2024-36350 A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the lea
CVE-2024-36357 A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage
CVE-2024-26726 In the Linux kernel, the following vulnerability has been resolved: btrfs: don't drop extent_map for free space inode on write error While running
CVE-2025-38245 In the Linux kernel, the following vulnerability has been resolved: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). syzbo
CVE-2025-38249 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In sn
CVE-2025-38251 In the Linux kernel, the following vulnerability has been resolved: atm: clip: prevent NULL deref in clip_push() Blamed commit missed that vcc_dest
CVE-2025-38257 In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apq
CVE-2025-38230 In the Linux kernel, the following vulnerability has been resolved: jfs: validate AG parameters in dbMount() to prevent crashes Validate db_agheigh
CVE-2025-38262 In the Linux kernel, the following vulnerability has been resolved: tty: serial: uartlite: register uart driver in init When two instances of uart
CVE-2025-38263 In the Linux kernel, the following vulnerability has been resolved: bcache: fix NULL pointer in cache_set_flush() 1. LINELINE#1887 is some codes ab
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()

Version: 5.15.0-1044.44 2025-08-28 13:06:53 UTC

  linux-nvidia-tegra (5.15.0-1044.44) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1044.44 -proposed tracker (LP: #2119848)

  [ Ubuntu-realtime: 5.15.0-1091.100 ]

  * jammy/linux-realtime: 5.15.0-1091.100 -proposed tracker (LP: #2119852)
  [ Ubuntu: 5.15.0-153.163 ]
  * jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)
  * CVE-2024-57996 // CVE-2025-37752
    - net_sched: sch_sfq: annotate data-races around q->perturb_period
    - net_sched: sch_sfq: handle bigger packets
    - net_sched: sch_sfq: don't allow 1 packet limit
    - net_sched: sch_sfq: use a temporary work area for validating
      configuration
    - net_sched: sch_sfq: move the limit validation
  * CVE-2025-38350
    - net/sched: Always pass notifications when child class becomes empty
  * CVE-2024-27407
    - fs/ntfs3: Fixed overflow check in mi_enum_attr()
  * watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
    5.15.0-144-generic (LP: #2118407)
    - fs/proc: do_task_stat: use __for_each_thread()

 -- Noah Wager <email address hidden> Thu, 21 Aug 2025 12:05:11 -0700

2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()



About   -   Send Feedback to @ubuntu_updates