UbuntuUpdates.org

Package "linux-nvidia-tegra-igx"

Name: linux-nvidia-tegra-igx

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1027.27
Release: jammy (22.04)
Level: updates
Repository: main

Links



Other versions of "linux-nvidia-tegra-igx" in Jammy

Repository Area Version
security main 5.15.0-1027.27
security universe 5.15.0-1008.8
updates universe 5.15.0-1008.8
proposed main 5.15.0-1028.28

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1027.27 2025-06-12 15:08:46 UTC

  linux-nvidia-tegra-igx (5.15.0-1027.27) jammy; urgency=medium

  * jammy/linux-nvidia-tegra-igx: 5.15.0-1027.27 -proposed tracker
    (LP: #2111020)

  [ Ubuntu: 5.15.0-1038.38 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1038.38 -proposed tracker (LP: #2111023)
  * jammy/linux-realtime: 5.15.0-1085.94 -proposed tracker (LP: #2111027)
  * jammy/linux: 5.15.0-141.151 -proposed tracker (LP: #2111052)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
  * CVE-2024-56608
    - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
  * CVE-2024-53168
    - net: make sock_inuse_add() available
    - sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
  * CVE-2024-56551
    - drm/amdgpu: fix usage slab after free

 -- Abdur Rahman <email address hidden> Wed, 28 May 2025 10:28:32 -0400

Source diff to previous version
1786013 Packaging resync
CVE-2024-56608 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' An iss
CVE-2024-53168 In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket BUG: KASAN: slab-u
CVE-2024-56551 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-

Version: 5.15.0-1026.26 2025-05-27 10:07:16 UTC

  linux-nvidia-tegra-igx (5.15.0-1026.26) jammy; urgency=medium

  * jammy/linux-nvidia-tegra-igx: 5.15.0-1026.26 -proposed tracker
    (LP: #2110316)

  * NVIDIA internal test shows kernel warning during suspend/resume
    (LP: #2110309)
    - SAUCE: Revert "genirq: Make handle_enforce_irqctx() unconditionally
      available"

Source diff to previous version
2110309 NVIDIA internal test shows kernel warning during suspend/resume

Version: 5.15.0-1024.24 2025-05-01 23:07:59 UTC

  linux-nvidia-tegra-igx (5.15.0-1024.24) jammy; urgency=medium

  * jammy/linux-nvidia-tegra-igx: 5.15.0-1024.24 -proposed tracker
    (LP: #2107009)

  [ Ubuntu: 5.15.0-1036.36 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1036.36 -proposed tracker (LP: #2107010)
  * jammy/linux-realtime: 5.15.0-1083.92 -proposed tracker (LP: #2107013)
  * jammy/linux: 5.15.0-139.149 -proposed tracker (LP: #2107038)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
  * CVE-2023-52664
    - net: atlantic: eliminate double free in error handling logic
  * CVE-2023-52927
    - netfilter: allow exp not to be removed in nf_ct_find_expectation

 -- Abdur Rahman <email address hidden> Thu, 24 Apr 2025 14:43:39 -0400

Source diff to previous version
1786013 Packaging resync
CVE-2023-52664 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: eliminate double free in error handling logic Driver has a logic
CVE-2023-52927 In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_c

Version: 5.15.0-1023.23 2025-04-16 22:07:26 UTC

  linux-nvidia-tegra-igx (5.15.0-1023.23) jammy; urgency=medium

  * jammy/linux-nvidia-tegra-igx: 5.15.0-1023.23 -proposed tracker
    (LP: #2102557)

  * Miscellaneous tegra kernel packaging changes (LP: #2097735)
    - [Packaging] modprobe.d: blacklist upstream imx274

  [ Ubuntu: 5.15.0-1035.35 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1035.35 -proposed tracker (LP: #2102558)
  * apply NVIDIA patches March 31, 2025 (LP: #2105645)
    - NVIDIA: SAUCE: arm64: defconfig: Sanitize defconfig
    - NVIDIA: SAUCE: arm64: defconfig: Enable IP set support
    - NVIDIA: SAUCE: arm64: defconfig: Enable IP raw table support
    - [Config] nvidia-tegra: Explicitly enable IP set support
    - [Config] nvidia-tegra: Explicitly enable IP raw table support
  * jammy/linux-realtime: 5.15.0-1082.91 -proposed tracker (LP: #2102561)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.realtime/dkms-versions -- update from kernel-versions
      (main/2025.03.17)
  * jammy/linux: 5.15.0-138.148 -proposed tracker (LP: #2102587)
  * ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
    (LP: #2096976)
    - SAUCE: selftest: netfilter: fix null IP field in kci_test_ipsec_offload
  * CVE-2025-21756
    - vsock: Keep the binding until socket destruction
    - vsock: Orphan socket after transport release
  * CVE-2024-50256
    - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
  * CVE-2025-21702
    - pfifo_tail_enqueue: Drop new packet when sch->limit == 0
  * CVE-2025-21703
    - netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
  * CVE-2025-21700
    - net: sched: Disallow replacing of child qdisc from one parent to another
  * CVE-2024-46826
    - ELF: fix kernel.randomize_va_space double read
  * CVE-2024-56651
    - can: hi311x: hi3110_can_ist(): fix potential use-after-free
  * iBFT iSCSI out-of-bounds shift UBSAN warning (LP: #2097824)
    - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
  * CVE-2024-50248
    - ntfs3: Add bounds checking to mi_enum_attr()
    - fs/ntfs3: Sequential field availability check in mi_enum_attr()
  * CVE-2022-0995
    - watch_queue: Use the bitmap API when applicable
  * CVE-2024-26837
    - net: bridge: switchdev: Skip MDB replays of deferred events on offload
  * CVE-2025-21701
    - net: avoid race between device unregistration and ethnl ops
  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Abdur Rahman <email address hidden> Thu, 03 Apr 2025 18:07:49 -0400

Source diff to previous version
2097735 Miscellaneous tegra kernel packaging changes
2105645 apply NVIDIA patches March 31, 2025
1786013 Packaging resync
2096976 ipsec_offload in rtnetlink.sh from ubunsu_kselftests_net fails on O/J
2097824 iBFT iSCSI out-of-bounds shift UBSAN warning
CVE-2025-21756 In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; thi
CVE-2024-50256 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzb
CVE-2025-21702 In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In
CVE-2025-21703 In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_
CVE-2025-21700 In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion A
CVE-2024-46826 In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_sp
CVE-2024-56651 In the Linux kernel, the following vulnerability has been resolved: can: hi311x: hi3110_can_ist(): fix potential use-after-free The commit a22bd630
CVE-2024-50248 In the Linux kernel, the following vulnerability has been resolved: ntfs3: Add bounds checking to mi_enum_attr() Added bounds checking to make sure
CVE-2022-0995 An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of t
CVE-2024-26837 In the Linux kernel, the following vulnerability has been resolved: net: bridge: switchdev: Skip MDB replays of deferred events on offload Before t
CVE-2025-21701 In the Linux kernel, the following vulnerability has been resolved: net: avoid race between device unregistration and ethnl ops The following trace
CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th

Version: 5.15.0-1022.22 2025-04-07 12:07:06 UTC

  linux-nvidia-tegra-igx (5.15.0-1022.22) jammy; urgency=medium

  * jammy/linux-nvidia-tegra-igx: 5.15.0-1022.22 -proposed tracker
    (LP: #2102400)

  [ Ubuntu: 5.15.0-1034.34 ]

  * jammy/linux-nvidia-tegra: 5.15.0-1034.34 -proposed tracker (LP: #2102401)
  * jammy/linux-realtime: 5.15.0-1081.89 -proposed tracker (LP: #2102404)
  * jammy/linux: 5.15.0-136.147 -proposed tracker (LP: #2102429)
  * CVE-2024-57798
    - drm/dp_mst: Skip CSN if topology probing is not done yet
    - drm/dp_mst: Ensure mst_primary pointer is valid in
      drm_dp_mst_handle_up_req()
  * CVE-2024-56658
    - net: defer final 'struct net' free in netns dismantle
  * CVE-2024-35864
    - smb: client: fix potential UAF in smb2_is_valid_lease_break()
  * CVE-2024-35864/CVE-2024-26928
    - smb: client: fix potential UAF in cifs_debug_files_proc_show()

 -- Noah Wager <email address hidden> Tue, 25 Mar 2025 16:34:43 -0700

CVE-2024-57798 In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() W
CVE-2024-56658 In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-
CVE-2024-35864 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions tha
CVE-2024-26928 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions th



About   -   Send Feedback to @ubuntu_updates