UbuntuUpdates.org

Package "linux-xilinx-zynqmp"

Name: linux-xilinx-zynqmp

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1060.64
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "linux-xilinx-zynqmp" in Jammy

Repository Area Version
security universe 5.15.0-1059.63
proposed universe 5.15.0-1059.63
PPA: Canonical Kernel Team 5.15.0-1059.63

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1060.64 2025-11-11 18:09:30 UTC

  linux-xilinx-zynqmp (5.15.0-1060.64) jammy; urgency=medium

  * jammy/linux-xilinx-zynqmp: 5.15.0-1060.64 -proposed tracker (LP: #2127386)

  * Packaging resync (LP: #1786013)
    - [Packaging] zynqmp: Remove dwarfdump from Build-Depends

  [ Ubuntu: 5.15.0-161.171 ]

  * jammy/linux: 5.15.0-161.171 -proposed tracker (LP: #2127389)
  * VMSCAPE CVE-2025-40300 (LP: #2124105) // CVE-2025-40300
    - Documentation/hw-vuln: Add VMSCAPE documentation
    - x86/vmscape: Enumerate VMSCAPE bug
    - x86/vmscape: Add conditional IBPB mitigation
    - x86/vmscape: Enable the mitigation
    - x86/bugs: Move cpu_bugs_smt_update() down
    - x86/vmscape: Warn when STIBP is disabled with SMT
    - x86/vmscape: Add old Intel CPUs to affected list
  * VMSCAPE CVE-2025-40300 (LP: #2124105)
    - [Config] Enable MITIGATION_VMSCAPE config

 -- Stewart Hore <email address hidden> Mon, 20 Oct 2025 13:43:54 +1100

Source diff to previous version
1786013 Packaging resync
2124105 VMSCAPE CVE-2025-40300
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that ex

Version: 5.15.0-1059.63 2025-10-17 05:07:03 UTC

  linux-xilinx-zynqmp (5.15.0-1059.63) jammy; urgency=medium

  * jammy/linux-xilinx-zynqmp: 5.15.0-1059.63 -proposed tracker (LP: #2126544)

  [ Ubuntu: 5.15.0-160.170 ]

  * jammy/linux: 5.15.0-160.170 -proposed tracker (LP: #2126548)
  * [Regression Updates] System hangs when loading audit rules
    (5.15.0-156.166) (LP: #2126434)
    - netlink: avoid infinite retry looping in netlink_unicast()

 -- Stewart Hore <email address hidden> Fri, 03 Oct 2025 11:20:03 +1000

Source diff to previous version
2126434 [Regression Updates] System hangs when loading audit rules (5.15.0-156.166)

Version: 5.15.0-1057.61 2025-10-01 03:07:30 UTC

  linux-xilinx-zynqmp (5.15.0-1057.61) jammy; urgency=medium

  * jammy/linux-xilinx-zynqmp: 5.15.0-1057.61 -proposed tracker (LP: #2124007)

  * [KR260] Kernel error found 'OF: graph: no port node found in
    /axi/display@fd4a0000' (LP: #2122564)
    - arm64: dts: zynqmp: Add ports for the DisplayPort subsystem

  * [KD240] Kernel error found `zynqmp-display fd4a0000.display: no PHY
    found` (LP: #2121647)
    - SAUCE: arm64: zynqmp: Disable DP on kd240

  [ Ubuntu: 5.15.0-157.167 ]

  * jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class
  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()
  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY

 -- Stewart Hore <email address hidden> Wed, 24 Sep 2025 14:05:28 +1000

Source diff to previous version
2122564 [KR260] Kernel error found 'OF: graph: no port node found in /axi/display@fd4a0000'
2121647 [KD240] Kernel error found `zynqmp-display fd4a0000.display: no PHY found`
1786013 Packaging resync
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 5.15.0-1056.60 2025-09-23 17:07:14 UTC

  linux-xilinx-zynqmp (5.15.0-1056.60) jammy; urgency=medium

  * jammy/linux-xilinx-zynqmp: 5.15.0-1056.60 -proposed tracker (LP: #2120095)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.zynqmp/dkms-versions -- update from kernel-versions
      (main/2025.08.11)

  * Miscellaneous Ubuntu changes
    - [Configs] update CONFIG_CC_VERSION_TEXT

  [ Ubuntu: 5.15.0-156.166 ]

  * jammy/linux: 5.15.0-156.166 -proposed tracker (LP: #2120207)
  * minimal kernel lacks modules for blk disk in arm64 openstack environments
    where config_drive is required (LP: #2118499)
    - [Config] Enable SYM53C8XX_2 on arm64

  [ Ubuntu: 5.15.0-154.164 ]

  * jammy/linux: 5.15.0-154.164 -proposed tracker (LP: #2120098)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.08.11)
  * warning at iommu_dma_unmap_page when running ibv_rc_pingpong
    (LP: #2107816)
    - RDMA/mlx5: Fix a WARN during dereg_mr for DM type
  * dmesg flooded with errors: amdgpu: DP AUX transfer fail:4 (LP: #2115238)
    - drm/amd/display: Avoid flooding unnecessary info messages
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995)
    - ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode
    - fix proc_sys_compare() handling of in-lookup dentries
    - vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also
      `transport_local`
    - net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap
    - net: phy: smsc: Fix link failure in forced mode with Auto-MDIX
    - atm: clip: Fix memory leak of struct clip_vcc.
    - ice: safer stats processing
    - rxrpc: Fix oops due to non-existence of prealloc backlog struct
    - bpf: fix precision backtracking instruction iteration
    - bpf, sockmap: Fix skb refcnt race after locking changes
    - xen: replace xen_remap() with memremap()
    - x86/mce/amd: Fix threshold limit reset
    - x86/mce: Don't remove sysfs if thresholding sysfs init fails
    - x86/mce: Make sure CMCI banks are cleared during shutdown on Intel
    - gre: Fix IPv6 multicast route creation.
    - pinctrl: qcom: msm: mark certain pins as invalid for interrupts
    - drm/sched: Increment job count before swapping tail spsc queue
    - drm/gem: Fix race in drm_gem_handle_create_tail()
    - Revert "ACPI: battery: negate current when discharging"
    - btrfs: propagate last_unlink_trans earlier when doing a rmdir
    - btrfs: use btrfs_record_snapshot_destroy() during rmdir
    - RDMA/mlx5: Fix vport loopback for MPV device
    - pwm: mediatek: Ensure to disable clocks in error path
    - netlink: Fix rmem check in netlink_broadcast_deliver().
    - netlink: make sure we allow at least one dump skb
    - xhci: Allow RPM on the USB controller (1022:43f7) by default
    - usb: xhci: quirk for data loss in ISOC transfers
    - xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS
    - Input: xpad - support Acer NGR 200 Controller
    - usb:cdnsp: remove TRB_FLUSH_ENDPOINT command
    - usb: cdnsp: Replace snprintf() with the safer scnprintf() variant
    - usb: cdnsp: Fix issue with CV Bad Descriptor test
    - usb: dwc3: Abort suspend on soft disconnect failure
    - dma-buf: add dma_resv_for_each_fence_unlocked v8
    - dma-buf: use new iterator in dma_resv_wait_timeout
    - dma-buf: fix timeout handling in dma_resv_wait_timeout v2
    - wifi: zd1211rw: Fix potential NULL pointer dereference in
      zd_mac_tx_to_dev()
    - smb: server: make use of rdma_destroy_qp()
    - ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()
    - net: appletalk: Fix device refcount leak in atrtr_create()
    - net: phy: microchip: limit 100M workaround to link-down events on
      LAN88xx
    - can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to
      debug level
    - net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()
    - bnxt_en: Fix DCB ETS validation
    - atm: idt77252: Add missing `dma_map_error()`
    - um: vector: Reduce stack usage in vector_eth_configure()
    - net: usb: qmi_wwan: add SIMCom 8230C composition
    - HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2
    - vt: add missing notification when switching back to text mode
    - HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY
    - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras
    - Input: atkbd - do not skip atkbd_deactivate() when skipping
      ATKBD_CMD_GETID
    - x86/mm: Disable hugetlb page table sharing on 32-bit
    - Linux 5.15.189
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38067
    - rseq: Fix segfault on registration when rseq_cs is non-zero
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38074
    - vhost-scsi: protect vq->log_used with vq->mutex
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38439
    - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38441
    - netfilter: flowtable: account for Ethernet header in
      nf_flow_pppoe_proto()
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38443
    - nbd: fix uaf in nbd_genl_connect() error path
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38444
    - raid10: cleanup memleak at raid10_make_request
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38445
    - md/raid1: Fix stack memory use after return in raid1_reshape
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38375
    - virtio-net: ensure the received length does not exceed allocated size
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38448
    - usb: gadget: u_serial: Fix race condition in TTY wakeup
  * Jammy update: v5.15.189 upstream st

Source diff to previous version
1786013 Packaging resync
2118499 minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required
2107816 warning at iommu_dma_unmap_page when running ibv_rc_pingpong
2118995 Jammy update: v5.15.189 upstream stable release
2118993 Jammy update: v5.15.188 upstream stable release
2118977 Jammy update: v5.15.187 upstream stable release
2116904 Jammy update: v5.15.186 upstream stable release
2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2025-38067 In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field i
CVE-2025-38074 In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: protect vq->log_used with vq->mutex The vhost-scsi completion path
CVE-2025-38439 In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT When transmitting an XDP_
CVE-2025-38441 In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() syzb
CVE-2025-38443 In the Linux kernel, the following vulnerability has been resolved: nbd: fix uaf in nbd_genl_connect() error path There is a use-after-free issue i
CVE-2025-38444 In the Linux kernel, the following vulnerability has been resolved: raid10: cleanup memleak at raid10_make_request If raid10_read_request or raid10
CVE-2025-38445 In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_resha
CVE-2025-38375 In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_li
CVE-2025-38448 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix race condition in TTY wakeup A race condition occurs
CVE-2024-44939 In the Linux kernel, the following vulnerability has been resolved: jfs: fix null ptr deref in dtInsertEntry [syzbot reported] general protection f
CVE-2024-26775 In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of th
CVE-2022-48703 In the Linux kernel, the following vulnerability has been resolved: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR In s
CVE-2025-38457 In the Linux kernel, the following vulnerability has been resolved: net/sched: Abort __tc_modify_qdisc if parent class does not exist Lion's patch
CVE-2025-38458 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() atmarpd_dev_ops does n
CVE-2025-38459 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the spla
CVE-2025-38460 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected b
CVE-2025-38461 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload.
CVE-2025-38462 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_{g2h,h2g} TOCTOU vsock_find_cid() and vsock_dev_do_ioctl()
CVE-2025-38464 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_conn_close(). syzbot reported a null-ptr-deref
CVE-2025-38465 In the Linux kernel, the following vulnerability has been resolved: netlink: Fix wraparounds of sk->sk_rmem_alloc. Netlink has this pattern in some
CVE-2025-38466 In the Linux kernel, the following vulnerability has been resolved: perf: Revert to requiring CAP_SYS_ADMIN for uprobes Jann reports that uprobes c
CVE-2025-38467 In the Linux kernel, the following vulnerability has been resolved: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling If there's supp
CVE-2024-36350 A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the lea
CVE-2024-36357 A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage
CVE-2024-26726 In the Linux kernel, the following vulnerability has been resolved: btrfs: don't drop extent_map for free space inode on write error While running
CVE-2025-38245 In the Linux kernel, the following vulnerability has been resolved: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). syzbo
CVE-2025-38249 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In sn
CVE-2025-38251 In the Linux kernel, the following vulnerability has been resolved: atm: clip: prevent NULL deref in clip_push() Blamed commit missed that vcc_dest
CVE-2025-38257 In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apq
CVE-2025-38230 In the Linux kernel, the following vulnerability has been resolved: jfs: validate AG parameters in dbMount() to prevent crashes Validate db_agheigh
CVE-2025-38262 In the Linux kernel, the following vulnerability has been resolved: tty: serial: uartlite: register uart driver in init When two instances of uart
CVE-2025-38263 In the Linux kernel, the following vulnerability has been resolved: bcache: fix NULL pointer in cache_set_flush() 1. LINELINE#1887 is some codes ab
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()

Version: 5.15.0-1055.59 2025-08-27 04:07:48 UTC

  linux-xilinx-zynqmp (5.15.0-1055.59) jammy; urgency=medium

  * jammy/linux-xilinx-zynqmp: 5.15.0-1055.59 -proposed tracker (LP: #2119874)

  [ Ubuntu: 5.15.0-153.163 ]

  * jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)
  * CVE-2024-57996 // CVE-2025-37752
    - net_sched: sch_sfq: annotate data-races around q->perturb_period
    - net_sched: sch_sfq: handle bigger packets
    - net_sched: sch_sfq: don't allow 1 packet limit
    - net_sched: sch_sfq: use a temporary work area for validating
      configuration
    - net_sched: sch_sfq: move the limit validation
  * CVE-2025-38350
    - net/sched: Always pass notifications when child class becomes empty
  * CVE-2024-27407
    - fs/ntfs3: Fixed overflow check in mi_enum_attr()
  * watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
    5.15.0-144-generic (LP: #2118407)
    - fs/proc: do_task_stat: use __for_each_thread()

 -- Wei-Lin Chang <email address hidden> Fri, 15 Aug 2025 10:28:34 +0800

2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()



About   -   Send Feedback to @ubuntu_updates