UbuntuUpdates.org

Package "linux-nvidia-tegra-5.15"

Name: linux-nvidia-tegra-5.15

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1025.25~20.04.1
Release: focal (20.04)
Level: updates
Repository: universe

Links



Other versions of "linux-nvidia-tegra-5.15" in Focal

Repository Area Version
security universe 5.15.0-1025.25~20.04.1
proposed universe 5.15.0-1024.24~20.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1025.25~20.04.1 2024-05-21 15:07:02 UTC

  linux-nvidia-tegra-5.15 (5.15.0-1025.25~20.04.1) focal; urgency=medium

  * focal/linux-nvidia-tegra-5.15: 5.15.0-1025.25~20.04.1 -proposed tracker
    (LP: #2063266)

  [ Ubuntu: 5.15.0-1025.25 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1025.25 -proposed tracker (LP: #2063258)
  * apply NVIDIA patches April 6-16, 2024 (LP: #2061900)
    - NVIDIA: SAUCE: phy: xusb: Disable USB2 tracking for T234
    - NVIDIA: SAUCE: enable handling of macronix block protection
    - PCI: dwc: Restore MSI Receiver mask during resume
  * apply NVIDIA patches Mar 22 - April 5, 2024 (LP: #2060337)
    - NVIDIA: SAUCE: arm64: configs: enable hidraw
    - NVIDIA: SAUCE: PCI: tegra194: Fix probe path for Endpoint mode
    - NVIDIA: SAUCE: arm64: defconfig: Enable DMATEST
    - NVIDIA: SAUCE: arm64: configs: Enable CONFIG_CRYPTO_USER_API_* as module
    - NVIDIA: SAUCE: soc/tegra: fuse: Update Tegra234 nvmem keepout list
    - NVIDIA: SAUCE: soc/tegra: fuse: Remove security_mode fuse from keepout list
    - [Config] Enable DMATEST

 -- Noah Wager <email address hidden> Wed, 24 Apr 2024 11:56:01 -0700

Source diff to previous version
2061900 apply NVIDIA patches April 6-16, 2024
2060337 apply NVIDIA patches Mar 22 - April 5, 2024

Version: 5.15.0-1022.22~20.04.1 2024-03-11 23:07:01 UTC

  linux-nvidia-tegra-5.15 (5.15.0-1022.22~20.04.1) focal; urgency=medium

  * focal/linux-nvidia-tegra-5.15: 5.15.0-1022.22~20.04.1 -proposed tracker
    (LP: #2054579)

  [ Ubuntu: 5.15.0-1022.22 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1022.22 -proposed tracker (LP: #2053284)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/s2024.01.08)
  * apply nvidia-tegra patches 2024 Jan 16-Feb 5 (LP: #2052479)
    - NVIDIA: SAUCE: arm64: configs: enable CONFIG_IP_NF_TARGET_REDIRECT
    - NVIDIA: SAUCE: arm64: configs: Enable userspace I/O driver
    - NVIDIA: SAUCE: usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic
    - NVIDIA: SAUCE: arm64: configs: additional kubernetes related configs
  * jammy/linux-realtime: 5.15.0-1055.62 -proposed tracker (LP: #2052611)
  * jammy/linux: 5.15.0-97.107 -proposed tracker (LP: #2052600)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
  * partproke is broken on empty loopback device (LP: #2049689)
    - block: Move checking GENHD_FL_NO_PART to bdev_add_partition()
  * CVE-2023-51781
    - appletalk: Fix Use-After-Free in atalk_ioctl
  * CVE-2023-51780
    - atm: Fix Use-After-Free in do_vcc_ioctl
  * CVE-2023-6915
    - ida: Fix crash in ida_free when the bitmap is empty
  * CVE-2024-0565
    - smb: client: fix OOB in receive_encrypted_standard()
  * CVE-2024-0646
    - net: tls, update curr on splice as well
  * jammy/linux-realtime: 5.15.0-1054.60 -proposed tracker (LP: #2048310)
  * Jammy real-time patch set update: v5.15.145-rt73 (LP: #2049522)
    - rcu/tree: Protect rcu_rdp_is_offloaded() invocations on RT
    - sched: Introduce migratable()
    - arm64: mm: Make arch_faults_on_old_pte() check for migratability
    - printk: rename printk cpulock API and always disable interrupts
    - console: add write_atomic interface
    - kdb: only use atomic consoles for output mirroring
    - serial: 8250: implement write_atomic
    - printk: relocate printk_delay()
    - printk: call boot_delay_msec() in printk_delay()
    - printk: use seqcount_latch for console_seq
    - printk: introduce kernel sync mode
    - printk: move console printing to kthreads
    - printk: add console handover
    - printk: add pr_flush()
    - printk: Enhance the condition check of msleep in pr_flush()
    - sched: Switch wait_task_inactive to HRTIMER_MODE_REL_HARD
    - kthread: Move prio/affinite change into the newly created thread
    - genirq: Move prio assignment into the newly created thread
    - genirq: Disable irqfixup/poll on PREEMPT_RT.
    - efi: Allow efi=runtime
    - mm: Disable zsmalloc on PREEMPT_RT
    - net/core: disable NET_RX_BUSY_POLL on PREEMPT_RT
    - samples/kfifo: Rename read_lock/write_lock
    - crypto: testmgr - Only disable migration in crypto_disable_simd_for_test()
    - mm: Allow only SLUB on PREEMPT_RT
    - mm: page_alloc: Use migrate_disable() in drain_local_pages_wq()
    - mm/scatterlist: Replace the !preemptible warning in sg_miter_stop()
    - mm: Disable NUMA_BALANCING_DEFAULT_ENABLED and TRANSPARENT_HUGEPAGE on
      PREEMPT_RT
    - x86/softirq: Disable softirq stacks on PREEMPT_RT
    - Documentation/kcov: Include types.h in the example.
    - Documentation/kcov: Define `ip' in the example.
    - kcov: Allocate per-CPU memory on the relevant node.
    - kcov: Avoid enable+disable interrupts if !in_task().
    - kcov: Replace local_irq_save() with a local_lock_t.
    - net/sched: sch_ets: properly init all active DRR list handles
    - gen_stats: Add instead Set the value in __gnet_stats_copy_basic().
    - gen_stats: Add gnet_stats_add_queue().
    - mq, mqprio: Use gnet_stats_add_queue().
    - gen_stats: Move remaining users to gnet_stats_add_queue().
    - u64_stats: Introduce u64_stats_set()
    - net: sched: Protect Qdisc::bstats with u64_stats
    - net: sched: Use _bstats_update/set() instead of raw writes
    - net: sched: Merge Qdisc::bstats and Qdisc::cpu_bstats data types
    - net: sched: Remove Qdisc::running sequence counter
    - net: sched: Allow statistics reads from softirq.
    - net: sched: fix logic error in qdisc_run_begin()
    - net: sched: remove one pair of atomic operations
    - net: stats: Read the statistics in ___gnet_stats_copy_basic() instead of
      adding.
    - net: sched: gred: dynamically allocate tc_gred_qopt_offload
    - sched/rt: Annotate the RT balancing logic irqwork as IRQ_WORK_HARD_IRQ
    - irq_work: Allow irq_work_sync() to sleep if irq_work() no IRQ support.
    - irq_work: Handle some irq_work in a per-CPU thread on PREEMPT_RT
    - irq_work: Also rcuwait for !IRQ_WORK_HARD_IRQ on PREEMPT_RT
    - irq_poll: Use raise_softirq_irqoff() in cpu_dead notifier
    - smp: Wake ksoftirqd on PREEMPT_RT instead do_softirq().
    - fs/namespace: Boost the mount_lock.lock owner instead of spinning on
      PREEMPT_RT.
    - fscache: Use only one fscache_object_cong_wait.
    - sched: Clean up the might_sleep() underscore zoo
    - sched: Make cond_resched_*lock() variants consistent vs. might_sleep()
    - sched: Remove preempt_offset argument from __might_sleep()
    - sched: Cleanup might_sleep() printks
    - sched: Make might_sleep() output less confusing
    - sched: Make RCU nest depth distinct in __might_resched()
    - sched: Make cond_resched_lock() variants RT aware
    - locking/rt: Take RCU nesting into account for __might_resched()
    - sched: Limit the number of task migrations per batch on RT
    - sched: Disable TTWU_QUEUE on RT
    - sched: Move kprobes cleanup out of finish_task_switch()
    - sched: Delay task stack freeing on RT
    - sched: Move mmdrop to RCU on RT
    - cgroup: use irqsave in cgroup_rstat_flush_locked()
    - mm: workingset: replace IRQ-off check with a lockdep assert.
    - jump-label: disable if stop_machine() is used
    - locking: Remove rt_rwlock_is_contended()
    - lockdep/selftests: Avoid using local_lock_{acquire|release}().
    - sched: Trigger warning if ->migra

Source diff to previous version
1786013 Packaging resync
2052479 apply nvidia-tegra patches 2024 Jan 16-Feb 5
2049689 partproke is broken on empty loopback device
2049522 Jammy real-time patch set update: v5.15.145-rt73
2028158 [SRU] Duplicate Device_dax ids Created and hence Probing is Failing.
2045387 Add ODM driver f81604 usb-can
2045386 Add ODM driver gpio-m058ssan
2045385 Add ODM driver rtc-pcf85263
2045384 AppArmor patch for mq-posix interface is missing in jammy
2047382 Hotplugging SCSI disk in QEMU VM fails
2044192 Patches needed for AmpereOne (arm64)
2047630 Add quirk to disable i915 fastboot on B\u0026R PC
2035971 linux tools packages for derived kernels refuse to install simultaneously due to libcpupower name collision
2045562 [Debian] autoreconstruct - Do not generate chmod -x for deleted files
2046008 Jammy update: v5.15.136 upstream stable release
2045809 Jammy update: v5.15.135 upstream stable release
2029405 Change in trace file leads to test timeout in ftrace tests on 5.15 ARM64
2041842 Kernel doesn't compile with CONFIG_IMA
2044023 Jammy update: v5.15.134 upstream stable release
2043422 Jammy update: v5.15.133 upstream stable release
2041702 Jammy update: v5.15.132 upstream stable release
2049536 apply nvidia-tegra patches 2024 Jan 1-15
2046011 apply nvidia igx patches for Nov 29 - Dec 8 2023
2045080 apply nvidia igx patches for Oct 19 - Nov 28 2023
2038165 apply nvidia igx patches for Sep 20-29
2036672 apply nvidia igx patches for Aug 29 - Sep 19
2029295 Apply 2023-07-20 + 2023-07-31 IGX PRs from NVIDIA
2049530 apply nvidia-tegra patches for Jan 16
CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race co
CVE-2023-51780 An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race conditio
CVE-2023-6915 A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cau
CVE-2024-0565 An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Ker
CVE-2024-0646 An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with
CVE-2023-6622 A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue ma
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6040 An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checki
CVE-2023-6111 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-32252 A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF co
CVE-2023-6176 A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.

Version: 5.15.0-1020.20~20.04.1 2024-01-16 13:07:55 UTC

  linux-nvidia-tegra-5.15 (5.15.0-1020.20~20.04.1) focal; urgency=medium

  * focal/linux-nvidia-tegra-5.15: 5.15.0-1020.20~20.04.1 -proposed tracker
    (LP: #2045982)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/d2023.12.04)

  * NVIDIA pull request 1018-002v1, 1018-003v1, 1018-004v1 (LP: #2042935)
    - [Packaging] linux-nvidia-tegra-5.15: remove dmi-sysfs and surface_gpe

  * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439)
    - [Packaging] Make linux-tools-common depend on hwdata

  [ Ubuntu: 5.15.0-1020.20 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1020.20 -proposed tracker (LP: #2045981)
  * NVIDIA pull request 1018-002v1, 1018-003v1, 1018-004v1 (LP: #2042935)
    - NVIDIA: SAUCE: arm64: config: Enable BRCMFMAC driver
    - NVIDIA: SAUCE: memory: tegra: Add client for RCE in Tegra234
    - NVIDIA: SAUCE: phy: xusb-tegra186: No redundant pad control
    - usb: typec: ucsi: don't print PPM init deferred errors
    - NVIDIA: SAUCE: arm64: configs: enable NTFS fs
    - NVIDIA: SAUCE: Remove support for summation channel control
    - NVIDIA: SAUCE: hwmon: ina3221: Add support for channel summation disable
    - mmc: sdhci-tegra: Add runtime PM and OPP support
    - [Config] linux-nvidia-tegra: set CONFIG_NTFS_FS as built-in
    - NVIDIA: SAUCE: aquantia: issue PHY reset during phy init
    - NVIDIA: SAUCE: arm: configs: enable QFMT_V2 for quota
    - NVIDIA: SAUCE: arm64: configs: disable LOGO
    - NVIDIA: SAUCE: arm64: config: Disable DMI config
    - NVIDIA: SAUCE: platform: tegra: Add new config TEGRA_PROD_LEGACY
    - NVIDIA: SAUCE: configs: defconfig: enable TPM configs
    - [Config] linux-nvidia-tegra: Integrate config changes
    - NVIDIA: SAUCE: arm64: configs: Sanitize arm64 defconfig
    - NVIDIA: SAUCE: arm64: configs: Enable NFS server support
    - NVIDIA: SAUCE: arm64: configs: Enable dm_multipath driver
    - NVIDIA: SAUCE: arm64: configs: enable few matches for netfliter
    - NVIDIA: SAUCE: pinctrl: tegra: Set SFIO mode to Mux Register
    - Revert "pinctrl: tegra: Add support to display pin function"
    - pinctrl: tegra: Display pin function in pinconf-groups
    - [Packaging] linux-nvidia-tegra: remove dmi-sysfs and surface_gpe
  * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439)
    - [Packaging] Make linux-tools-common depend on hwdata
  * Packaging resync (LP: #1786013)
    - [Packaging] remove helper scripts
  * jammy/linux-realtime: 5.15.0-1052.58 -proposed tracker (LP: #2041583)
  * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439)
    - [Packaging] Make linux-tools-common depend on hwdata
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] resync update-dkms-versions helper
  * jammy/linux: 5.15.0-91.101 -proposed tracker (LP: #2043452)
  * USB bus error after upgrading to proposed kernel on lunar and jammy
    (LP: #2043197)
    - USB: core: Fix oversight in SuperSpeed initialization
  * jammy/linux: 5.15.0-90.100 -proposed tracker (LP: #2041603)
  * CVE-2023-25775
    - RDMA/irdma: Remove irdma_uk_mw_bind()
    - RDMA/irdma: Remove irdma_sc_send_lsmm_nostag()
    - RDMA/irdma: Remove irdma_cqp_up_map_cmd()
    - RDMA/irdma: Remove irdma_get_hw_addr()
    - RDMA/irdma: Make irdma_uk_cq_init() return a void
    - RDMA/irdma: optimize rx path by removing unnecessary copy
    - RDMA/irdma: Remove enum irdma_status_code
    - RDMA/irdma: Remove excess error variables
    - RDMA/irdma: Prevent zero-length STAG registration
  * CVE-2023-39189
    - netfilter: nfnetlink_osf: avoid OOB read
  * SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes
    (LP: #2039575)
    - net/smc: Fix pos miscalculation in statistics
  * CVE-2023-45871
    - igb: set max size RX buffer when store bad packet is enabled
  * CVE-2023-39193
    - netfilter: xt_sctp: validate the flag_info count
  * CVE-2023-39192
    - netfilter: xt_u32: validate user space input
  * CVE-2023-31085
    - ubi: Refuse attaching if mtd's erasesize is 0
  * CVE-2023-5717
    - perf: Disallow mis-matched inherited group reads
  * CVE-2023-5178
    - nvmet-tcp: Fix a possible UAF in queue intialization setup
  * CVE-2023-5158
    - vringh: don't use vringh_kiov_advance() in vringh_iov_xfer()
  * [SRU][J/L/M] UBUNTU: [Packaging] Make WWAN driver a loadable module
    (LP: #2033406)
    - [Packaging] Make WWAN driver loadable modules
  * HP ProBook 450 G8 Notebook fail to wifi test (LP: #2037513)
    - iwlwifi: mvm: Don't fail if PPAG isn't supported
    - wifi: iwlwifi: fw: skip PPAG for JF
  * usbip: error: failed to open /usr/share/hwdata//usb.ids (LP: #2039439)
    - [Packaging] Make linux-tools-common depend on hwdata
  * scripts/pahole-flags.sh change return to exit 0 (LP: #2035123)
    - SAUCE: scripts/pahole-flags.sh change return to exit 0
  * Unable to use nvme drive to install Ubuntu 23.10 (LP: #2040157)
    - misc: rtsx: Fix some platforms can not boot and move the l1ss judgment to
      probe
  * Jammy update: v5.15.131 upstream stable release (LP: #2039610)
    - erofs: ensure that the post-EOF tails are all zeroed
    - ksmbd: fix wrong DataOffset validation of create context
    - ksmbd: replace one-element array with flex-array member in struct
      smb2_ea_info
    - ARM: pxa: remove use of symbol_get()
    - mmc: au1xmmc: force non-modular build and remove symbol_get usage
    - net: enetc: use EXPORT_SYMBOL_GPL for enetc_phc_index
    - rtc: ds1685: use EXPORT_SYMBOL_GPL for ds1685_rtc_poweroff
    - modules: only allow symbol_get of EXPORT_SYMBOL_GPL modules
    - USB: serial: option: add Quectel EM05G variant (0x030e)
    - USB: serial: option: add FOXCONN T99W368/T99W373 product
    - ALSA: usb-audio: Fix init call orders for UAC1
    - usb: dwc3: meson-g12a: do post init to fix broken usb after resumption
    - usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0
    - HID: wacom: remove the b

Source diff to previous version
1786013 Packaging resync
2042935 NVIDIA pull request 1018-002v1, 1018-003v1, 1018-004v1
2039439 usbip: error: failed to open /usr/share/hwdata//usb.ids
2043197 USB bus error after upgrading to proposed kernel on lunar and jammy
2039575 SMC stats: Wrong bucket calculation for payload of exactly 4096 bytes
2033406 [SRU][J/L/M] UBUNTU: [Packaging] Make WWAN driver a loadable module
2037513 HP ProBook 450 G8 Notebook fail to wifi test
2035123 scripts/pahole-flags.sh change return to exit 0
2040157 Unable to use nvme drive to install Ubuntu 23.10
2039610 Jammy update: v5.15.131 upstream stable release
2039608 Jammy update: v5.15.130 upstream stable release
2039227 Jammy update: v5.15.129 upstream stable release
2038486 Jammy update: v5.15.128 upstream stable release
2038382 Jammy update: v5.15.127 upstream stable release
CVE-2023-25775 Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentia
CVE-2023-39189 A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num
CVE-2023-45871 An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be ade
CVE-2023-39193 A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local pr
CVE-2023-39192 A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw all
CVE-2023-31085 An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd->erasesize), used indirec
CVE-2023-5717 A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local pri
CVE-2023-5178 A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` ...
CVE-2023-5158 A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a d
CVE-2023-42754 A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before c
CVE-2023-37453 An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/us

Version: 5.15.0-1019.19~20.04.1 2023-11-21 02:07:09 UTC

  linux-nvidia-tegra-5.15 (5.15.0-1019.19~20.04.1) focal; urgency=medium

  * focal/linux-nvidia-tegra-5.15: 5.15.0-1019.19~20.04.1 -proposed tracker
    (LP: #2041993)

  * CVE-2023-42755
    - [Config] linux-nvidia-tegra-5.15: NET_CLS_RSVP and NET_CLS_RSVP6

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] update helper scripts

  [ Ubuntu: 5.15.0-1019.19 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1019.19 -proposed tracker (LP: #2041991)
  * NVIDIA pull requests 1017-001v3 (LP: #2034622)
    - NVIDIA: SAUCE: thermal: tegra-bpmp: Check if BPMP supports trip points
    - NVIDIA: SAUCE: simplefb: add support to parse fb-memory from DT
    - NVIDIA: SAUCE: memory: tegra: Add bpmp_id and type for nvdla
    - NVIDIA: SAUCE: memory: tegra: Add clients for VI in Tegra234
    - NVIDIA: SAUCE: mailbox: tegra-hsp: Add support for virtualization
    - NVIDIA: SAUCE: memory: tegra: Fix SID override
    - dma-buf: Update obsoluted comments on dma_buf_vmap/vunmap()
    - dma-buf-map: Rename to iosys-map
    - of: Move simple-framebuffer device handling from simplefb to of
    - iosys-map: Add offset to iosys_map_memcpy_to()
    - iosys-map: Add a few more helpers
    - NVIDIA: SAUCE: mtd: spi-nor: support for GD
    - NVIDIA: SAUCE: mmc: host: Apply post auto-tuning correction
    - NVIDIA: SAUCE: fs: eventpoll: Add smp_mb() before waitqueue_active
    - NVIDIA: SAUCE: crypto: tegra: Add Kconfig to support Tegra SE
    - drm/vgem: use shmem helpers
    - NVIDIA: SAUCE: dma-buf-map: Fix-up iosys-map integration
    - NVIDIA: SAUCE: arm64: configs: enable cifs
    - [Config] linux-nvidia-tegra: set CONFIG_CRYPTO_DEV_TEGRA=m
  * CVE-2023-42755
    - [Config] remove NET_CLS_RSVP and NET_CLS_RSVP6
  * jammy/linux-realtime: 5.15.0-1050.56 -proposed tracker (LP: #2038035)
  * jammy/linux: 5.15.0-88.98 -proposed tracker (LP: #2038055)
  * CVE-2023-4244
    - netfilter: nf_tables: don't skip expired elements during walk
    - netfilter: nf_tables: adapt set backend to use GC transaction API
    - netfilter: nft_set_hash: mark set element as dead when deleting from packet
      path
    - netfilter: nf_tables: GC transaction API to avoid race with control plane
    - netfilter: nf_tables: remove busy mark and gc batch API
    - netfilter: nf_tables: don't fail inserts if duplicate has expired
    - netfilter: nf_tables: fix kdoc warnings after gc rework
    - netfilter: nf_tables: fix GC transaction races with netns and netlink event
      exit path
    - netfilter: nf_tables: GC transaction race with netns dismantle
    - netfilter: nf_tables: GC transaction race with abort path
    - netfilter: nf_tables: use correct lock to protect gc_list
    - netfilter: nf_tables: defer gc run if previous batch is still pending
    - netfilter: nft_dynset: disallow object maps
    - netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction
  * CVE-2023-42756
    - netfilter: ipset: Fix race between IPSET_CMD_CREATE and IPSET_CMD_SWAP
  * CVE-2023-4623
    - net/sched: sch_hfsc: Ensure inner classes have fsc curve
  * PCI BARs larger than 128GB are disabled (LP: #2037403)
    - PCI: Support BAR sizes up to 8TB
  * Fix unstable audio at low levels on Thinkpad P1G4 (LP: #2037077)
    - ALSA: hda/realtek - ALC287 I2S speaker platform support
  * Check for changes relevant for security certifications (LP: #1945989)
    - [Packaging] Add a new fips-checks script
  * Jammy update: v5.15.126 upstream stable release (LP: #2037593)
    - io_uring: gate iowait schedule on having pending requests
    - perf: Fix function pointer case
    - net/mlx5: Free irqs only on shutdown callback
    - arm64: errata: Add workaround for TSB flush failures
    - arm64: errata: Add detection for TRBE write to out-of-range
    - [Config] updateconfigs for ARM64_ERRATUM_ and
      ARM64_WORKAROUND_TSB_FLUSH_FAILURE
    - iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982
    - iommu/arm-smmu-v3: Document MMU-700 erratum 2812531
    - iommu/arm-smmu-v3: Add explicit feature for nesting
    - iommu/arm-smmu-v3: Document nesting-related errata
    - arm64: dts: imx8mn-var-som: add missing pull-up for onboard PHY reset pinmux
    - word-at-a-time: use the same return type for has_zero regardless of
      endianness
    - KVM: s390: fix sthyi error handling
    - wifi: cfg80211: Fix return value in scan logic
    - net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
    - net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer()
    - bpf: Add length check for SK_DIAG_BPF_STORAGE_REQ_MAP_FD parsing
    - rtnetlink: let rtnl_bridge_setlink checks IFLA_BRIDGE_MODE length
    - net: dsa: fix value check in bcm_sf2_sw_probe()
    - perf test uprobe_from_different_cu: Skip if there is no gcc
    - net: sched: cls_u32: Fix match key mis-addressing
    - mISDN: hfcpci: Fix potential deadlock on &hc->lock
    - qed: Fix kernel-doc warnings
    - qed: Fix scheduling in a tasklet while getting stats
    - net: annotate data-races around sk->sk_max_pacing_rate
    - net: add missing READ_ONCE(sk->sk_rcvlowat) annotation
    - net: add missing READ_ONCE(sk->sk_sndbuf) annotation
    - net: add missing READ_ONCE(sk->sk_rcvbuf) annotation
    - net: add missing data-race annotations around sk->sk_peek_off
    - net: add missing data-race annotation for sk_ll_usec
    - net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.
    - bpf, cpumap: Handle skb as well when clean up ptr_ring
    - bpf: sockmap: Remove preempt_disable in sock_map_sk_acquire
    - net: ll_temac: Switch to use dev_err_probe() helper
    - net: ll_temac: fix error checking of irq_of_parse_and_map()
    - net: korina: handle clk prepare error in korina_probe()
    - net: netsec: Ignore 'phy-mode' on SynQuacer in DT mode
    - net: dcb: choose correct policy to parse DCB_ATTR_BCN
    - s390/qeth: Don't call dev_close/dev_open (DOWN/UP)
    - ip6mr: Fix skb_under_panic in ip6mr_ca

Source diff to previous version
1786013 Packaging resync
2034622 NVIDIA pull requests 1017-001v3
2037403 PCI BARs larger than 128GB are disabled
2037077 Fix unstable audio at low levels on Thinkpad P1G4
1945989 Check for changes relevant for security certifications
2037593 Jammy update: v5.15.126 upstream stable release
2036843 Jammy update: v5.15.125 upstream stable release
2035163 Avoid address overwrite in kernel_connect
2035166 NULL Pointer Dereference During KVM MMU Page Invalidation
2034479 Fix suspend hang on Lenovo workstation
2034745 [regression] Unable to initialize SGX enclaves with XFRM other than 3
2035400 Jammy update: v5.15.124 upstream stable release
2034612 Jammy update: v5.15.123 upstream stable release
CVE-2023-42755 wild pointer access in rsvp classifer in the Linux kernel
CVE-2023-42756 A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic
CVE-2023-42753 An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->n
CVE-2023-42752 integer overflows in kmalloc_reserve()
CVE-2023-4881 ** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
CVE-2023-31083 An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSET
CVE-2023-3772 A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADM

Version: 5.15.0-1018.18~20.04.1 2023-10-30 09:09:07 UTC

  linux-nvidia-tegra-5.15 (5.15.0-1018.18~20.04.1) focal; urgency=medium

  * focal/linux-nvidia-tegra-5.15: 5.15.0-1018.18~20.04.1 -proposed tracker
    (LP: #2038682)

  * Jammy update: v5.15.117 upstream stable release (LP: #2030107)
    - [Config] nvidia-tegra-5.15: remove BLK_DEV_SX8 modules

  * Jammy update: v5.15.118 upstream stable release (LP: #2030239)
    - [Config] nvidia-tegra-5.15: remove DECNET modules

  * Please enable Renesas RZ platform serial installer (LP: #2022361)
    - [Config] nvidia-tegra-5.15: remove sh-sci modules

  [ Ubuntu: 5.15.0-1018.18 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1018.18 -proposed tracker (LP: #2038680)
  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/d2023.09.14)
  * Jammy update: v5.15.117 upstream stable release (LP: #2030107)
    - [Config] updateconfigs for BLK_DEV_SX8
  * Jammy update: v5.15.118 upstream stable release (LP: #2030239)
    - [Config] updateconfigs for DECNET
  * Please enable Renesas RZ platform serial installer (LP: #2022361)
    - [Config] Mark sh-sci as built-in
  * NVIDIA pull requests 1017-001v3 (LP: #2034622)
    - NVIDIA: SAUCE: driver: cpufreq: remove volatile as not needed
    - NVIDIA: SAUCE: config: Disable CONFIG_LOCALVERSION_AUTO
    - NVIDIA: SAUCE: code-owners: Populate OWNERS file
    - NVIDIA: SAUCE: mailbox: tegra-hsp: Add sm ops route_irq & set_irq
    - NVIDIA: SAUCE: arch: arm64: enable HDA_INTEL config
    - NVIDIA: SAUCE: spi: spi-tegra114: retain the spi mode
    - NVIDIA: SAUCE: arm64: config: Enable MTD_UBI
    - NVIDIA: SAUCE: s25fs: Add post-get-map-id fixup for S25FS512S
    - i2c: tegra: Fix i2c-tegra DMA config option processing
    - cpufreq: tegra194: add online/offline hooks
    - NVIDIA: SAUCE: Revert "i2c: tegra: Allocate DMA memory for DMA engine"
    - NVIDIA: SAUCE: arm64: configs: Enable BINFMT_MISC support
    - thermal: tegra-bpmp: Handle errors in BPMP response
    - thermal/drivers/tegra-bpmp: Handle offline zones
    - NVIDIA: SAUCE: arm64: config: recovery_chain: Enable KEXEC configs
    - NVIDIA: SAUCE: iommu: Don't reserve IOVA when address and size are zero
    - NVIDIA: SAUCE: memory: tegra: Add SID override on resume
    - [Config] linux-nvidia-tegra: integrate defconfig changes
  * jammy/linux-realtime: 5.15.0-1048.54 -proposed tracker (LP: #2036555)
  * jammy/linux: 5.15.0-86.96 -proposed tracker (LP: #2036575)
  * 5.15.0-85 live migration regression (LP: #2036675)
    - Revert "KVM: x86: Always enable legacy FP/SSE in allowed user XFEATURES"
    - Revert "x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0"
  * Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95 (LP: #2035181)
    - selftests/bpf: fix static assert compilation issue for test_cls_*.c
  * `refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic
    (LP: #2034447)
    - crypto: rsa-pkcs1pad - Use helper to set reqsize
  * jammy/linux-realtime: 5.15.0-1047.53 -proposed tracker (LP: #2033801)
  * Jammy update: v5.15.117 upstream stable release (LP: #2030107)
    - [Config] updateconfigs for BLK_DEV_SX8
  * Jammy update: v5.15.118 upstream stable release (LP: #2030239)
    - [Config] updateconfigs for DECNET
  * Please enable Renesas RZ platform serial installer (LP: #2022361)
    - [Config] Mark sh-sci as built-in
  * Packaging resync (LP: #1786013)
    - [Packaging] update helper scripts
  * jammy/linux: 5.15.0-85.95 -proposed tracker (LP: #2033821)
  * Please enable Renesas RZ platform serial installer (LP: #2022361)
    - [Config] enable hihope RZ/G2M serial console
    - [Config] Mark sh-sci as built-in
  * Request backport of xen timekeeping performance improvements (LP: #2033122)
    - x86/xen/time: prefer tsc as clocksource when it is invariant
  * kdump doesn't work with UEFI secure boot and kernel lockdown enabled on
    ARM64 (LP: #2033007)
    - [Config]: Enable CONFIG_KEXEC_IMAGE_VERIFY_SIG
    - kexec, KEYS: make the code in bzImage64_verify_sig generic
    - arm64: kexec_file: use more system keyrings to verify kernel image signature
  * ubuntu_kernel_selftests:net:vrf-xfrm-tests.sh: 8 failed test cases on
    jammy/fips (LP: #2019880)
    - selftests: net: vrf-xfrm-tests: change authentication and encryption algos
  * ubuntu_kernel_selftests:net:tls: 88 failed test cases on jammy/fips
    (LP: #2019868)
    - selftests/harness: allow tests to be skipped during setup
    - selftests: net: tls: check if FIPS mode is enabled
  * A general-proteciton exception during guest migration to unsupported PKRU
    machine (LP: #2032164, reverted)
    - x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
    - KVM: x86: Always enable legacy FP/SSE in allowed user XFEATURES
  * CVE-2023-4569
    - netfilter: nf_tables: deactivate catchall elements in next generation
  * CVE-2023-20569
    - x86/cpu, kvm: Add support for CPUID_80000021_EAX
    - x86/srso: Add a Speculative RAS Overflow mitigation
    - x86/srso: Add IBPB_BRTYPE support
    - x86/srso: Add SRSO_NO support
    - x86/srso: Add IBPB
    - x86/srso: Add IBPB on VMEXIT
    - x86/srso: Fix return thunks in generated code
    - x86/srso: Tie SBPB bit setting to microcode patch detection
    - x86: fix backwards merge of GDS/SRSO bit
    - x86/srso: Fix build breakage with the LLVM linker
    - x86/cpu: Fix __x86_return_thunk symbol type
    - x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk()
    - x86/alternative: Make custom return thunk unconditional
    - objtool: Add frame-pointer-specific function ignore
    - x86/ibt: Add ANNOTATE_NOENDBR
    - x86/cpu: Clean up SRSO return thunk mess
    - x86/cpu: Rename original retbleed methods
    - x86/cpu: Rename srso_(.*)_alias to srso_alias_\1
    - x86/cpu: Cleanup the untrain mess
    - x86/srso: Explain the untraining sequences a bit more
    - x86/static_call: Fix __static_call_fixup()
    - x86/retpoline: Don't clobber RFLAGS during srso_safe_ret()
    - x86/srso: Disable the mitigatio

2030107 Jammy update: v5.15.117 upstream stable release
2030239 Jammy update: v5.15.118 upstream stable release
2022361 Please enable Renesas RZ platform serial installer
1786013 Packaging resync
2034622 NVIDIA pull requests 1017-001v3
2036675 5.15.0-85 live migration regression
2035181 Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95
2034447 `refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic
2033122 Request backport of xen timekeeping performance improvements
2033007 kdump doesn't work with UEFI secure boot and kernel lockdown enabled on ARM64
2019880 ubuntu_kernel_selftests:net:vrf-xfrm-tests.sh: 8 failed test cases on jammy/fips
2019868 ubuntu_kernel_selftests:net:tls: 88 failed test cases on jammy/fips
2032164 A general-proteciton exception during guest migration to unsupported PKRU machine
2028122 Fix unreliable ethernet cable detection on I219 NIC
2031333 Need to get fine-grained control for FAN(TFN) Participant.
2030924 [SRU][Ubuntu 22.04.1] Unable to interpret the frequency values in cpuinfo_min_freq and cpuino_max_freq sysfs files.
2032176 Crashing with CPU soft lock on GA kernel 5.15.0.79.76 and HWE kernel 5.19.0-46.47-22.04.1
2032690 Jammy update: v5.15.122 upstream stable release
2032689 Jammy update: v5.15.121 upstream stable release
2032688 Jammy update: v5.15.120 upstream stable release
2032683 Jammy update: v5.15.119 upstream stable release
CVE-2023-4569 A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to
CVE-2023-40283 An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the
CVE-2023-4194 A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized acc
CVE-2023-4155 A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in t ...
CVE-2023-1206 A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN floo
CVE-2023-4273 A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, wh
CVE-2023-4128 A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local a
CVE-2023-3863 A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special



About   -   Send Feedback to @ubuntu_updates