UbuntuUpdates.org

Package "linux-mtk"

Name: linux-mtk

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1041.49
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "linux-mtk" in Jammy

Repository Area Version
security universe 5.15.0-1041.49
proposed universe 5.15.0-1041.49
PPA: Canonical Kernel Team 5.15.0-1041.49

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1041.49 2025-08-27 04:07:48 UTC

  linux-mtk (5.15.0-1041.49) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1041.49 -proposed tracker (LP: #2120899)

  * Miscellaneous upstream changes
    - GENIO: media: i2c: ap1302: Track hardware init state to prevent double
      cleanup

 -- Jian Hui Lee <email address hidden> Tue, 19 Aug 2025 10:47:38 +0800

Source diff to previous version

Version: 5.15.0-1040.48 2025-07-24 19:09:42 UTC

  linux-mtk (5.15.0-1040.48) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1040.48 -proposed tracker (LP: #2114884)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  * Miscellaneous Ubuntu changes
    - [Config] disable ext2/ext3 native driver

  * Miscellaneous upstream changes
    - FIXUP: FROMLIST: media: subdev: Fix locking in v4l2 subdev
    - Revert "BL_INTERNAL: usb: mtu3: support ip-sleep wakeup for MT8365"

Source diff to previous version
1786013 Packaging resync

Version: 5.15.0-1038.45 2025-05-29 12:49:08 UTC

  linux-mtk (5.15.0-1038.45) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1038.45 -proposed tracker (LP: #2107431)

  * [g700] Suspend hang during suspend cycles test when no HDMI monitor is
    connected (LP: #2107430)
    - Revert "UBUNTU: [Config] CONFIG_DRM_MEDIATEK_HDMI=y and
      CONFIG_PHY_MTK_HDMI=y"

 -- Jian Hui Lee <email address hidden> Wed, 16 Apr 2025 11:27:32 +0800

Source diff to previous version
2107430 [g700] Suspend hang during suspend cycles test when no HDMI monitor is connected

Version: 5.15.0-1037.44 2025-03-04 20:07:16 UTC

  linux-mtk (5.15.0-1037.44) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1037.44 -proposed tracker (LP: #2099348)

  * DSI and eDP panel can't rotate screen to flipped. (LP: #2099371)
    - drm/mediatek: Add support for 180-degree rotation in the display driver

 -- Jian Hui Lee <email address hidden> Fri, 21 Feb 2025 10:48:36 +0800

Source diff to previous version
2099371 DSI and eDP panel can't rotate screen to flipped.

Version: 5.15.0-1036.43 2025-02-13 14:06:53 UTC

  linux-mtk (5.15.0-1036.43) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1036.43 -proposed tracker (LP: #2088406)

  * [g700] support p1v4 hardware (LP: #2081699)
    - SAUCE: (no-up) dtbo: genio-700-evk: fix touch for display-dsi-p1v4.dts

  * mtk-fsource: ubuntu kernel integration (LP: #2092506)
    - SAUCE: (no-up) ubuntu: mtk-fsource-driver: add mediatek fsource driver

  * [g1200-evk] Call trace appeared when reload mtk_mdp3 module (LP: #2090981)
    - SAUCE: (no-up) GENIO: media: mediatek: mdp3: fix unload module flow

  * [g510] mt8188-mdla-devfreq probe failed message found in dmesg
    (LP: #2090978)
    - SAUCE: (no-up) power: Ignore duplicate OPP entry to fix probe fail

  * Fail to detect card after unplugging DPoC cable and reboot (LP: #2090979)
    - SAUCE: (no-up) GENIO: drm/mediatek: dp: Remove DP enabled check

  * Miscellaneous Ubuntu changes
    - SAUCE: (no-up) drm/mediatek: fix build error for DRM_MODE_ROTATE_0
      declaration

  [ Ubuntu: 5.15.0-130.140 ]

  * jammy/linux: 5.15.0-130.140 -proposed tracker (LP: #2092132)
  * ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
    5.15.0-127.137 (LP: #2091990)
    - netfilter: xtables: fix typo causing some targets not to load on IPv6

  [ Ubuntu: 5.15.0-128.138 ]

  * jammy/linux: 5.15.0-128.138 -proposed tracker (LP: #2090163)
  * CVE-2024-50264
    - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
  * CVE-2024-53057
    - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
  * CVE-2024-43904
    - drm/amd/display: Add null checks for 'stream' and 'plane' before
      dereferencing
  * CVE-2024-40973
    - media: mtk-vcodec: potential null pointer deference in SCP
  * CVE-2024-38553
    - net: fec: remove .ndo_poll_controller to avoid deadlocks
  * CVE-2024-26822
    - smb: client: set correct id, uid and cruid for multiuser automounts
  * CVE-2020-12351 // CVE-2020-12352 // CVE-2020-24490
    - [Config] Disable BlueZ highspeed support
  * CVE-2024-40910
    - ax25: Fix refcount imbalance on inbound connections
  * CVE-2024-35963
    - Bluetooth: hci_sock: Fix not validating setsockopt user input
  * CVE-2024-35965
    - Bluetooth: L2CAP: Fix not validating setsockopt user input
  * CVE-2024-35966
    - Bluetooth: RFCOMM: Fix not validating setsockopt user input
  * CVE-2024-35967
    - Bluetooth: SCO: Fix not validating setsockopt user input

  [ Ubuntu: 5.15.0-127.137 ]

  * jammy/linux: 5.15.0-127.137 -proposed tracker (LP: #2086357)
  * Jammy update: v5.15.168 upstream stable release (LP: #2086242)
    - parisc: Fix 64-bit userspace syscall path
    - parisc: Fix stack start for ADDR_NO_RANDOMIZE personality
    - of/irq: Support #msi-cells=<0> in of_msi_get_domain
    - drm: omapdrm: Add missing check for alloc_ordered_workqueue
    - jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
    - jbd2: correctly compare tids with tid_geq function in jbd2_fc_begin_commit
    - mm: krealloc: consider spare memory for __GFP_ZERO
    - ocfs2: fix the la space leak when unmounting an ocfs2 volume
    - ocfs2: fix uninit-value in ocfs2_get_block()
    - ocfs2: reserve space for inline xattr before attaching reflink tree
    - ocfs2: cancel dqi_sync_work before freeing oinfo
    - ocfs2: remove unreasonable unlock in ocfs2_read_blocks
    - ocfs2: fix null-ptr-deref when journal load failed.
    - ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate
    - usbnet: ipheth: fix carrier detection in modes 1 and 4
    - net: ethernet: use ip_hdrlen() instead of bit shift
    - net: phy: vitesse: repair vsc73xx autonegotiation
    - powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL
    - btrfs: update target inode's ctime on unlink
    - Input: ads7846 - ratelimit the spi_sync error message
    - Input: synaptics - enable SMBus for HP Elitebook 840 G2
    - HID: multitouch: Add support for GT7868Q
    - scripts: kconfig: merge_config: config files: add a trailing newline
    - platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
    - drm/msm/adreno: Fix error return if missing firmware-name
    - Input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table
    - NFSv4: Fix clearing of layout segments in layoutreturn
    - NFS: Avoid unnecessary rescanning of the per-server delegation list
    - platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
    - platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array
    - mptcp: pm: Fix uaf in __timer_delete_sync
    - arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
      Puma
    - minmax: reduce min/max macro expansion in atomisp driver
    - net: tighten bad gso csum offset check in virtio_net_hdr
    - mm: avoid leaving partial pfn mappings around in error case
    - fs/ntfs3: Use kvfree to free memory allocated by kvmalloc
    - arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E
    - eeprom: digsy_mtc: Fix 93xx46 driver probe failure
    - selftests/bpf: Support SOCK_STREAM in unix_inet_redir_to_connected()
    - hwmon: (pmbus) Introduce and use write_byte_data callback
    - hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >=
      1.2
    - ice: fix accounting for filters shared by multiple VSIs
    - igb: Always call igb_xdp_ring_update_tail() under Tx lock
    - net/mlx5e: Add missing link modes to ptys2ethtool_map
    - net/mlx5: Explicitly set scheduling element and TSAR type
    - net/mlx5: Add support to create match definer
    - net/mlx5: Add IFC bits and enums for flow meter
    - net/mlx5: Add missing masks and QoS bit masks for scheduling elements
    - fou: fix initialization of grc
    - octeontx2-af: Set XOFF on other child transmit schedulers during SMQ flush
    - octeontx2-af: Modify SMQ flush sequence to drop packets
    - net: ftgmac100: Enable TX interrupt to avoid TX timeout
    - netfilter: nft_socket: fix sk r

2081699 [g700] support p1v4 hardware
2092506 mtk-fsource: ubuntu kernel integration
2090981 [g1200-evk] Call trace appeared when reload mtk_mdp3 module
2090978 [g510] mt8188-mdla-devfreq probe failed message found in dmesg
2090979 Fail to detect card after unplugging DPoC cable and reboot
2091990 ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137
2086242 Jammy update: v5.15.168 upstream stable release
2080378 IOMMU warnings on AMD systems after booting into kdump kernel
2064176 LXD fan bridge causes blocked tasks
2085082 Cannot detect audio sinks and sources in proposed kernel
2077321 Please backport the more restrictive XSAVES deactivation for Zen1/2 arch
2081279 Jammy update: v5.15.167 upstream stable release
2080594 Jammy update: v5.15.166 upstream stable release
1959940 [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part
2069961 turbostat fails with too many open files on large systems
2078428 Jammy update: v5.15.165 upstream stable release
2074380 [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible
2076100 Jammy update: v5.15.164 upstream stable release
CVE-2024-50264 In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans Du
CVE-2024-53057 In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_bac
CVE-2024-43904 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing
CVE-2024-40973 In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of
CVE-2024-38553 In the Linux kernel, the following vulnerability has been resolved: net: fec: remove .ndo_poll_controller to avoid deadlocks There is a deadlock is
CVE-2024-26822 In the Linux kernel, the following vulnerability has been resolved: smb: client: set correct id, uid and cruid for multiuser automounts When uid, g
CVE-2020-12351 Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-12352 Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2020-24490 Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all
CVE-2024-40910 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix refcount imbalance on inbound connections When releasing a socket in
CVE-2024-35963 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input
CVE-2024-35965 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix not validating setsockopt user input Check user input len
CVE-2024-35966 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: Fix not validating setsockopt user input syzbot reported rfc
CVE-2024-35967 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix not validating setsockopt user input syzbot reported sco_so
CVE-2024-36968 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() l2cap_le_flowctl_i
CVE-2024-35904 In the Linux kernel, the following vulnerability has been resolved: selinux: avoid dereference of garbage after mount failure In case kern_mount()
CVE-2024-42156 In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Wipe copies of clear-key structures on failure Wipe all sensitive da
CVE-2024-44942 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC syzbot
CVE-2024-38538 In the Linux kernel, the following vulnerability has been resolved: net: bridge: xmit: make sure we have at least eth header len bytes syzbot trigg
CVE-2024-42158 In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings Replace memzero_exp
CVE-2024-38667 In the Linux kernel, the following vulnerability has been resolved: riscv: prevent pt_regs corruption for secondary idle threads Top of the kernel
CVE-2024-44940 In the Linux kernel, the following vulnerability has been resolved: fou: remove warn in gue_gro_receive on unsupported protocol Drop the WARN_ON_ON
CVE-2024-42079 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer dereference in gfs2_log_flush In gfs2_jindex_free(), set
CVE-2024-35951 In the Linux kernel, the following vulnerability has been resolved: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Subject: [PAT
CVE-2023-52532 In the Linux kernel, the following vulnerability has been resolved: net: mana: Fix TX CQE error handling For an unknown TX CQE error type (probably
CVE-2023-52621 In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These thre
CVE-2024-26947 In the Linux kernel, the following vulnerability has been resolved: ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses Sin
CVE-2023-52639 In the Linux kernel, the following vulnerability has been resolved: KVM: s390: vsie: fix race during shadow creation Right now it is possible to se
CVE-2024-26800 In the Linux kernel, the following vulnerability has been resolved: tls: fix use-after-free on failed backlog decryption When the decrypt request g
CVE-2024-41071 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Avoid address calculations via out of bounds array indexing req
CVE-2024-40915 In the Linux kernel, the following vulnerability has been resolved: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context __kernel
CVE-2024-38611 In the Linux kernel, the following vulnerability has been resolved: media: i2c: et8ek8: Don't strip remove function when driver is builtin Using __
CVE-2024-38602 In the Linux kernel, the following vulnerability has been resolved: ax25: Fix reference count leak issues of ax25_dev The ax25_addr_ax25dev() and a
CVE-2024-26669 In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: Fix chain template offload When a qdisc is deleted from a ne
CVE-2024-26607 In the Linux kernel, the following vulnerability has been resolved: drm/bridge: sii902x: Fix probing race issue A null pointer dereference crash ha
CVE-2024-26893 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Fix double free in SMC transport cleanup path When the gene
CVE-2024-26661 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' In
CVE-2024-25744 In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c
CVE-2024-45016 In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu
CVE-2024-38630 In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the
CVE-2024-27397 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time



About   -   Send Feedback to @ubuntu_updates