UbuntuUpdates.org

Package "linux-nvidia-tegra"


Moved to jammy:universe:updates


Name: linux-nvidia-tegra

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: *DELETED*
Release: jammy (22.04)
Level: proposed
Repository: universe

Links



Other versions of "linux-nvidia-tegra" in Jammy

Repository Area Version
security universe 5.15.0-1022.22
updates universe 5.15.0-1022.22

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: *DELETED* 2024-03-19 15:07:00 UTC
Moved to jammy:universe:updates
No changelog for deleted or moved packages.

Version: 5.15.0-1022.22 2024-02-22 03:06:51 UTC

  linux-nvidia-tegra (5.15.0-1022.22) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1022.22 -proposed tracker (LP: #2053284)

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/s2024.01.08)

  * apply nvidia-tegra patches 2024 Jan 16-Feb 5 (LP: #2052479)
    - NVIDIA: SAUCE: arm64: configs: enable CONFIG_IP_NF_TARGET_REDIRECT
    - NVIDIA: SAUCE: arm64: configs: Enable userspace I/O driver
    - NVIDIA: SAUCE: usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic
    - NVIDIA: SAUCE: arm64: configs: additional kubernetes related configs

  [ Ubuntu: 5.15.0-1055.62 ]

  * jammy/linux-realtime: 5.15.0-1055.62 -proposed tracker (LP: #2052611)
  * jammy/linux: 5.15.0-97.107 -proposed tracker (LP: #2052600)
  * Packaging resync (LP: #1786013)
    - [Packaging] update annotations scripts
  * partproke is broken on empty loopback device (LP: #2049689)
    - block: Move checking GENHD_FL_NO_PART to bdev_add_partition()
  * CVE-2023-51781
    - appletalk: Fix Use-After-Free in atalk_ioctl
  * CVE-2023-51780
    - atm: Fix Use-After-Free in do_vcc_ioctl
  * CVE-2023-6915
    - ida: Fix crash in ida_free when the bitmap is empty
  * CVE-2024-0565
    - smb: client: fix OOB in receive_encrypted_standard()
  * CVE-2024-0646
    - net: tls, update curr on splice as well

  [ Ubuntu: 5.15.0-1054.60 ]

  * jammy/linux-realtime: 5.15.0-1054.60 -proposed tracker (LP: #2048310)
  * Jammy real-time patch set update: v5.15.145-rt73 (LP: #2049522)
    - rcu/tree: Protect rcu_rdp_is_offloaded() invocations on RT
    - sched: Introduce migratable()
    - arm64: mm: Make arch_faults_on_old_pte() check for migratability
    - printk: rename printk cpulock API and always disable interrupts
    - console: add write_atomic interface
    - kdb: only use atomic consoles for output mirroring
    - serial: 8250: implement write_atomic
    - printk: relocate printk_delay()
    - printk: call boot_delay_msec() in printk_delay()
    - printk: use seqcount_latch for console_seq
    - printk: introduce kernel sync mode
    - printk: move console printing to kthreads
    - printk: add console handover
    - printk: add pr_flush()
    - printk: Enhance the condition check of msleep in pr_flush()
    - sched: Switch wait_task_inactive to HRTIMER_MODE_REL_HARD
    - kthread: Move prio/affinite change into the newly created thread
    - genirq: Move prio assignment into the newly created thread
    - genirq: Disable irqfixup/poll on PREEMPT_RT.
    - efi: Allow efi=runtime
    - mm: Disable zsmalloc on PREEMPT_RT
    - net/core: disable NET_RX_BUSY_POLL on PREEMPT_RT
    - samples/kfifo: Rename read_lock/write_lock
    - crypto: testmgr - Only disable migration in crypto_disable_simd_for_test()
    - mm: Allow only SLUB on PREEMPT_RT
    - mm: page_alloc: Use migrate_disable() in drain_local_pages_wq()
    - mm/scatterlist: Replace the !preemptible warning in sg_miter_stop()
    - mm: Disable NUMA_BALANCING_DEFAULT_ENABLED and TRANSPARENT_HUGEPAGE on
      PREEMPT_RT
    - x86/softirq: Disable softirq stacks on PREEMPT_RT
    - Documentation/kcov: Include types.h in the example.
    - Documentation/kcov: Define `ip' in the example.
    - kcov: Allocate per-CPU memory on the relevant node.
    - kcov: Avoid enable+disable interrupts if !in_task().
    - kcov: Replace local_irq_save() with a local_lock_t.
    - net/sched: sch_ets: properly init all active DRR list handles
    - gen_stats: Add instead Set the value in __gnet_stats_copy_basic().
    - gen_stats: Add gnet_stats_add_queue().
    - mq, mqprio: Use gnet_stats_add_queue().
    - gen_stats: Move remaining users to gnet_stats_add_queue().
    - u64_stats: Introduce u64_stats_set()
    - net: sched: Protect Qdisc::bstats with u64_stats
    - net: sched: Use _bstats_update/set() instead of raw writes
    - net: sched: Merge Qdisc::bstats and Qdisc::cpu_bstats data types
    - net: sched: Remove Qdisc::running sequence counter
    - net: sched: Allow statistics reads from softirq.
    - net: sched: fix logic error in qdisc_run_begin()
    - net: sched: remove one pair of atomic operations
    - net: stats: Read the statistics in ___gnet_stats_copy_basic() instead of
      adding.
    - net: sched: gred: dynamically allocate tc_gred_qopt_offload
    - sched/rt: Annotate the RT balancing logic irqwork as IRQ_WORK_HARD_IRQ
    - irq_work: Allow irq_work_sync() to sleep if irq_work() no IRQ support.
    - irq_work: Handle some irq_work in a per-CPU thread on PREEMPT_RT
    - irq_work: Also rcuwait for !IRQ_WORK_HARD_IRQ on PREEMPT_RT
    - irq_poll: Use raise_softirq_irqoff() in cpu_dead notifier
    - smp: Wake ksoftirqd on PREEMPT_RT instead do_softirq().
    - fs/namespace: Boost the mount_lock.lock owner instead of spinning on
      PREEMPT_RT.
    - fscache: Use only one fscache_object_cong_wait.
    - sched: Clean up the might_sleep() underscore zoo
    - sched: Make cond_resched_*lock() variants consistent vs. might_sleep()
    - sched: Remove preempt_offset argument from __might_sleep()
    - sched: Cleanup might_sleep() printks
    - sched: Make might_sleep() output less confusing
    - sched: Make RCU nest depth distinct in __might_resched()
    - sched: Make cond_resched_lock() variants RT aware
    - locking/rt: Take RCU nesting into account for __might_resched()
    - sched: Limit the number of task migrations per batch on RT
    - sched: Disable TTWU_QUEUE on RT
    - sched: Move kprobes cleanup out of finish_task_switch()
    - sched: Delay task stack freeing on RT
    - sched: Move mmdrop to RCU on RT
    - cgroup: use irqsave in cgroup_rstat_flush_locked()
    - mm: workingset: replace IRQ-off check with a lockdep assert.
    - jump-label: disable if stop_machine() is used
    - locking: Remove rt_rwlock_is_contended()
    - lockdep/selftests: Avoid using local_lock_{acquire|release}().
    - sched: Trigger warning if ->migration_disabled counter underflows.
    - rtmutex: Add a special case for ww-

1786013 Packaging resync
2052479 apply nvidia-tegra patches 2024 Jan 16-Feb 5
2049689 partproke is broken on empty loopback device
2049522 Jammy real-time patch set update: v5.15.145-rt73
2028158 [SRU] Duplicate Device_dax ids Created and hence Probing is Failing.
2045387 Add ODM driver f81604 usb-can
2045386 Add ODM driver gpio-m058ssan
2045385 Add ODM driver rtc-pcf85263
2045384 AppArmor patch for mq-posix interface is missing in jammy
2047382 Hotplugging SCSI disk in QEMU VM fails
2044192 Patches needed for AmpereOne (arm64)
2047630 Add quirk to disable i915 fastboot on B\u0026R PC
2035971 linux tools packages for derived kernels refuse to install simultaneously due to libcpupower name collision
2045562 [Debian] autoreconstruct - Do not generate chmod -x for deleted files
2046008 Jammy update: v5.15.136 upstream stable release
2045809 Jammy update: v5.15.135 upstream stable release
2029405 Change in trace file leads to test timeout in ftrace tests on 5.15 ARM64
2041842 Kernel doesn't compile with CONFIG_IMA
2044023 Jammy update: v5.15.134 upstream stable release
2043422 Jammy update: v5.15.133 upstream stable release
2041702 Jammy update: v5.15.132 upstream stable release
CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race co
CVE-2023-51780 An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race conditio
CVE-2023-6915 A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cau
CVE-2024-0565 An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Ker
CVE-2024-0646 An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with
CVE-2023-6622 A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue ma
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6040 An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-46813 An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checki
CVE-2023-6111 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-32252 A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF co
CVE-2023-6176 A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.

Version: *DELETED* 2024-02-05 07:08:35 UTC
Moved to jammy:universe:updates
No changelog for deleted or moved packages.

Version: 5.15.0-1021.21 2024-01-24 16:06:53 UTC

  linux-nvidia-tegra (5.15.0-1021.21) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1021.21 -proposed tracker (LP: #2049525)

  * apply nvidia-tegra patches 2024 Jan 1-15 (LP: #2049536)
    - NVIDIA: SAUCE: mmc: host: restrict min clk rate to 20MHz
    - NVIDIA: SAUCE: arm64: configs: enable PCIe ethernet
    - NVIDIA: SAUCE: mmc: sdhci-tegra: do not set padpipe_clk_override
    - NVIDIA: SAUCE: arm64: configs: Sanitize defconfig
    - NVIDIA: SAUCE: clocksource/drivers/timer-tegra186: add WDIOC_GETTIMELEFT
      support
    - NVIDIA: SAUCE: clocksource/drivers/timer-tegra186: fix watchdog self-
      pinging.
    - NVIDIA: SAUCE: arm64: configs: enable CONFIG_DMI
    - NVIDIA: SAUCE: mmc: sdhci-tegra: Enable wake on SD card event
    - NVIDIA: SAUCE: mmc: core: Update bus status on sd card removal
    - [Config] Re-enable CONFIG_DMI

  * apply nvidia igx patches for Nov 29 - Dec 8 2023 (LP: #2046011)
    - NVIDIA: SAUCE: arm64: configs: disable pps debug config
    - NVIDIA: SAUCE: net: phy: aquantia: Poll for valid FW ID.

  * apply nvidia igx patches for Oct 19 - Nov 28 2023 (LP: #2045080)
    - NVIDIA: SAUCE: arm64: configs: Sanitize arm64 defconfig
    - NVIDIA: SAUCE: arm64: configs: enable cfs bandwidth for k8s
    - NVIDIA: SAUCE: arm64: config: Disable DMI config

  * apply nvidia igx patches for Sep 20-29 (LP: #2038165)
    - drm/format-helper: Add drm_fb_xrgb8888_to_rgb332()
    - drm/format-helper: Add drm_fb_xrgb8888_to_rgb888()
    - drm/gud: Add GUD_PIXEL_FORMAT_R8
    - drm/gud: Add GUD_PIXEL_FORMAT_RGB332
    - drm/gud: Add GUD_PIXEL_FORMAT_RGB888
    - drm/format-helper: Export drm_fb_clip_offset()
    - drm/format-helper: Rework format-helper memcpy functions
    - drm/format-helper: Add destination-buffer pitch to drm_fb_swab()
    - drm/format-helper: Rework format-helper conversion functions
    - drm/format-helper: Streamline blit-helper interface
    - drm/simpledrm: Enable FB_DAMAGE_CLIPS property
    - drm/simpledrm: Support virtual screen sizes
    - drm/format-helper: Add drm_fb_xrgb8888_to_xrgb2101010_toio()
    - drm/simpledrm: Add [AX]RGB2101010 formats
    - drm/simpledrm: Request memory region in driver
    - drm/format-helper: Add drm_fb_xrgb8888_to_gray8_line()
    - drm/format-helper: Add drm_fb_xrgb8888_to_mono_reversed()
    - drm/repaper: Use format helper for xrgb8888 to monochrome conversion
    - drm/simpledrm: Use fbdev defaults for shadow buffering
    - drm/format-helper: Rename drm_fb_xrgb8888_to_mono_reversed()
    - drm/format-helper: Fix XRGB888 to monochrome conversion
    - drm/format_helper: fix a kernel-doc typo
    - drm/format-helper: Print warning on missing format conversion
    - drm/format-helper: Add RGB888-to-XRGB8888 conversion
    - drm/format-helper: Add RGB565-to-XRGB8888 conversion
    - drm/format-helper: Implement drm_fb_swab() with per-line helpers
    - drm/format-helper: Remove optional byte-swap from line convertion
    - drm/format-helper: Unify the parameters of all per-line conversion helpers
    - drm/format-helper: Share implementation among conversion helpers
    - drm/atomic-helper: Add helper drm_atomic_helper_check_crtc_state()
    - drm/fourcc: Add drm_format_info_bpp() helper
    - drm/format-helper: Fix endianness in drm_fb_*_to_*() conversion helpers
    - drm/simpledrm: Remove mem field from device structure
    - drm/simpledrm: Inline device-init helpers
    - drm/simpledrm: Remove pdev field from device structure
    - drm/simpledrm: Compute framebuffer stride if not set
    - drm/simpledrm: Convert to atomic helpers
    - drm/format-helper: Provide drm_fb_blit()
    - drm/format-helper: Add drm_fb_build_fourcc_list() helper
    - drm/simpledrm: Compute linestride with drm_format_info_min_pitch()
    - drm/simpledrm: Use drm_atomic_get_new_plane_state()
    - drm/simpledrm: Remove !fb check from atomic_update
    - drm/simpledrm: Iterate over damage clips
    - drm/simpledrm: Synchronize access to GEM BOs
    - drm/simpledrm: Set preferred depth from format of scanout buffer
    - drm/simpledrm: Use struct iosys_map consistently
    - drm/simpledrm: Add support for system memory framebuffers
    - drm/simpledrm: Fix an NULL vs IS_ERR() bug

  * apply nvidia igx patches for Aug 29 - Sep 19 (LP: #2036672)
    - NVIDIA: SAUCE: arm64: configs: Sanitize arm64 defconfig
    - NVIDIA: SAUCE: arch: arm64: enable FB_SIMPLE config
    - NVIDIA: SAUCE: (no-up) mm: mprotect: Avoid write-fault handler for dirty
      written PTEs

  * Apply 2023-07-20 + 2023-07-31 IGX PRs from NVIDIA (LP: #2029295)
    - SAUCE: arm64: defconfig: enable CONFIG_ISO9660_FS

  * apply nvidia-tegra patches for Jan 16 (LP: #2049530)
    - NVIDIA: SAUCE: tegra-epl: Set handshake retry count to 20
    - NVIDIA: SAUCE: tegra-epl: publish kernel pm state to FSI
    - NVIDIA: SAUCE: tegra-epl: Set default handshake retry count to 25
    - NVIDIA: SAUCE: arm64: configs: enable pps client configs
    - NVIDIA: SAUCE: arm64: configs: enable NTFS fs
    - NVIDIA: SAUCE: Revert "mmc: host: Apply post auto-tuning correction"

  [ Ubuntu: 5.15.0-1053.59 ]

  * jammy/linux-realtime: 5.15.0-1053.59 -proposed tracker (LP: #2048594)
  * Packaging resync (LP: #1786013)
    - [Packaging] remove helper scripts
  * jammy/linux: 5.15.0-92.102 -proposed tracker (LP: #2048614)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * CVE-2024-0193
    - netfilter: nf_tables: skip set commit for deleted/destroyed sets
  * CVE-2023-6040
    - netfilter: nf_tables: Reject tables of unsupported family
  * CVE-2023-6606
    - smb: client: fix OOB in smbCalcSize()
  * CVE-2023-6817
    - netfilter: nft_set_pipapo: skip inactive elements during set walk
  * CVE-2023-6932
    - ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet
  * CVE-2023-6931
    - perf/core: Add a new read format to get a number of lost samples
    - perf: Fix perf_event_validate_size()
    - perf: Fix perf_event_validate_size() lockdep splat

 -

2049536 apply nvidia-tegra patches 2024 Jan 1-15
2046011 apply nvidia igx patches for Nov 29 - Dec 8 2023
2045080 apply nvidia igx patches for Oct 19 - Nov 28 2023
2038165 apply nvidia igx patches for Sep 20-29
2036672 apply nvidia igx patches for Aug 29 - Sep 19
2029295 Apply 2023-07-20 + 2023-07-31 IGX PRs from NVIDIA
2049530 apply nvidia-tegra patches for Jan 16
1786013 Packaging resync
CVE-2024-0193 A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is r
CVE-2023-6040 An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported
CVE-2023-6606 An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker
CVE-2023-6817 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The func
CVE-2023-6932 A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation. A race condition c
CVE-2023-6931 A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escala

Version: *DELETED* 2024-01-06 01:06:56 UTC
Moved to jammy:universe:updates
No changelog for deleted or moved packages.



About   -   Send Feedback to @ubuntu_updates