UbuntuUpdates.org

Package "linux-mtk"

Name: linux-mtk

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1040.48
Release: jammy (22.04)
Level: security
Repository: universe

Links



Other versions of "linux-mtk" in Jammy

Repository Area Version
updates universe 5.15.0-1040.48
proposed universe 5.15.0-1040.48
PPA: Canonical Kernel Team 5.15.0-1040.48

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1040.48 2025-07-24 11:06:54 UTC

  linux-mtk (5.15.0-1040.48) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1040.48 -proposed tracker (LP: #2114884)

  * Packaging resync (LP: #1786013)
    - [Packaging] update variants

  * Miscellaneous Ubuntu changes
    - [Config] disable ext2/ext3 native driver

  * Miscellaneous upstream changes
    - FIXUP: FROMLIST: media: subdev: Fix locking in v4l2 subdev
    - Revert "BL_INTERNAL: usb: mtu3: support ip-sleep wakeup for MT8365"

Source diff to previous version
1786013 Packaging resync

Version: 5.15.0-1038.45 2025-05-29 15:09:00 UTC

  linux-mtk (5.15.0-1038.45) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1038.45 -proposed tracker (LP: #2107431)

  * [g700] Suspend hang during suspend cycles test when no HDMI monitor is
    connected (LP: #2107430)
    - Revert "UBUNTU: [Config] CONFIG_DRM_MEDIATEK_HDMI=y and
      CONFIG_PHY_MTK_HDMI=y"

 -- Jian Hui Lee <email address hidden> Wed, 16 Apr 2025 11:27:32 +0800

Source diff to previous version
2107430 [g700] Suspend hang during suspend cycles test when no HDMI monitor is connected

Version: 5.15.0-1037.44 2025-03-05 01:07:22 UTC

  linux-mtk (5.15.0-1037.44) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1037.44 -proposed tracker (LP: #2099348)

  * DSI and eDP panel can't rotate screen to flipped. (LP: #2099371)
    - drm/mediatek: Add support for 180-degree rotation in the display driver

 -- Jian Hui Lee <email address hidden> Fri, 21 Feb 2025 10:48:36 +0800

Source diff to previous version
2099371 DSI and eDP panel can't rotate screen to flipped.

Version: 5.15.0-1034.40 2024-10-17 00:07:13 UTC

  linux-mtk (5.15.0-1034.40) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1034.40 -proposed tracker (LP: #2082876)

  * [g1200] regulators not enabled after sru d2024.08.12 (LP: #2082868)
    - SAUCE: (no-up) regulator: mt6360: fix compatibility issue for downstream
      device tree
    - SAUCE: (no-up) power: supply: mt6360_charger: fix compatibility issue for
      downstream device tree

  * [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded
    failed during cold boot stress test (LP: #2078763)
    - [Config] CONFIG_DRM_MEDIATEK_HDMI=y and CONFIG_PHY_MTK_HDMI=y

  * [g510][g700] add fsource device tree node (LP: #2078762)
    - SAUCE: (no-up) GENIO: arm64: dts: mediatek: genio-700-evk/genio-510-evk: add
      fsource device tree node

  [ Ubuntu: 5.15.0-119.129 ]

  * jammy/linux: 5.15.0-119.129 -proposed tracker (LP: #2075665)
  * Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
    (LP: #2073267)
    - SAUCE: Revert "randomize_kstack: Improve entropy diffusion"
  * CVE-2024-26921
    - inet: inet_defrag: prevent sk release while still in use
  * Jammy update: v5.15.162 upstream stable release (LP: #2073765) //
    CVE-2024-39484
    - mmc: davinci: Don't strip remove function when driver is builtin
  * Jammy update: v5.15.162 upstream stable release (LP: #2073765)
    - mmc: davinci_mmc: Convert to platform remove callback returning void
  * CVE-2024-39292
    - um: Add winch to winch_handlers before registering winch IRQ
  * CVE-2024-36901
    - ipv6: prevent NULL dereference in ip6_output()
  * CVE-2024-26830
    - i40e: Do not allow untrusted VF to remove administratively set MAC
  * CVE-2024-26680
    - net: atlantic: Fix DMA mapping for PTP hwts ring
  * CVE-2023-52760
    - gfs2: Fix slab-use-after-free in gfs2_qd_dealloc
  * CVE-2023-52629
    - sh: push-switch: Reorder cleanup operations to avoid use-after-free bug

  [ Ubuntu: 5.15.0-118.128 ]

  * jammy/linux: 5.15.0-118.128 -proposed tracker (LP: #2072255)
  * Jammy update: v5.15.160 upstream stable release (LP: #2070292)
    - drm/amd/display: Fix division by zero in setup_dsc_config
    - pinctrl: core: handle radix_tree_insert() errors in
      pinctrl_register_one_pin()
    - nfsd: don't allow nfsd threads to be signalled.
    - KEYS: trusted: Fix memory leak in tpm2_key_encode()
    - Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
    - net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
    - net: bcmgenet: synchronize UMAC_CMD access
    - netlink: annotate lockless accesses to nlk->max_recvmsg_len
    - netlink: annotate data-races around sk->sk_err
    - KVM: x86: Clear "has_error_code", not "error_code", for RM exception
      injection
    - drm/amdgpu: Fix possible NULL dereference in
      amdgpu_ras_query_error_status_helper()
    - binder: fix max_thread type inconsistency
    - usb: typec: ucsi: displayport: Fix potential deadlock
    - serial: kgdboc: Fix NMI-safety problems from keyboard reset code
    - remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
    - KEYS: trusted: Do not use WARN when encode fails
    - admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
    - docs: kernel_include.py: Cope with docutils 0.21
    - Linux 5.15.160
  * Jammy update: v5.15.159 upstream stable release (LP: #2070028)
    - dmaengine: pl330: issue_pending waits until WFP state
    - dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state"
    - wifi: nl80211: don't free NULL coalescing rule
    - ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
    - ksmbd: validate request buffer size in smb2_allocate_rsp_buf()
    - ksmbd: clear RENAME_NOREPLACE before calling vfs_rename
    - eeprom: at24: Use dev_err_probe for nvmem register failure
    - eeprom: at24: Probe for DDR3 thermal sensor in the SPD case
    - eeprom: at24: fix memory corruption race condition
    - pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T
    - pinctrl/meson: fix typo in PDM's pin name
    - pinctrl: core: delete incorrect free in pinctrl_enable()
    - pinctrl: mediatek: paris: Rework mtk_pinconf_{get,set} switch/case logic
    - pinctrl: mediatek: paris: Fix PIN_CONFIG_INPUT_SCHMITT_ENABLE readback
    - pinctrl: mediatek: paris: Rework support for
      PIN_CONFIG_{INPUT,OUTPUT}_ENABLE
    - sunrpc: add a struct rpc_stats arg to rpc_create_args
    - nfs: expose /proc/net/sunrpc/nfs in net namespaces
    - nfs: make the rpc_stat per net namespace
    - nfs: Handle error of rpc_proc_register() in nfs_net_init().
    - power: rt9455: hide unused rt9455_boost_voltage_values
    - power: supply: mt6360_charger: Fix of_match for usb-otg-vbus regulator
    - pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
    - regulator: mt6360: De-capitalize devicetree regulator subnodes
    - bpf, kconfig: Fix DEBUG_INFO_BTF_MODULES Kconfig definition
    - bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
    - bpf: Fix a verifier verbose message
    - spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs
    - s390/mm: Fix storage key clearing for guest huge pages
    - s390/mm: Fix clearing storage keys for huge pages
    - xdp: Move conversion to xdp_frame out of map functions
    - xdp: Add xdp_do_redirect_frame() for pre-computed xdp_frames
    - xdp: use flags field to disambiguate broadcast redirect
    - bna: ensure the copied buf is NUL terminated
    - octeontx2-af: avoid off-by-one read from userspace
    - nsh: Restore skb->{protocol,data,mac_header} for outer header in
      nsh_gso_segment().
    - net l2tp: drop flow hash on forward
    - s390/vdso: Add CFI for RA register to asm macro vdso_func
    - net: qede: sanitize 'rc' in qede_add_tc_flower_fltr()
    - net: qede: use return from qede_parse_flow_attr() for flower
    - net: qede: use return from qede_parse_flow_attr() for flow_spec
    - net: qede: use return from q

Source diff to previous version
2082868 [g1200] regulators not enabled after sru d2024.08.12\t
2078763 [uc22][g700] systemd-backlight@backlight:1c008000.dsi0.0.service loaded failed during cold boot stress test
2078762 [g510][g700] add fsource device tree node
2073267 Virtualbox Guru meditation on VM start caused by kernel commit in v6.9-rc4
2073765 Jammy update: v5.15.162 upstream stable release
2070292 Jammy update: v5.15.160 upstream stable release
2070028 Jammy update: v5.15.159 upstream stable release
2061091 Freezing user space processes failed after 20.008 seconds (1 tasks refusing to freeze, wq_busy=0)
2069081 idxd: NULL pointer dereference reading wq op_config attribute
2068738 AMD GPUs fail with null pointer dereference when IOMMU enabled, leading to black screen
1786013 Packaging resync
2067974 Jammy update: v5.15.158 upstream stable release
2067959 Jammy update: v5.15.157 upstream stable release
2046722 [SRU][22.04.4]: megaraid_sas: Critical Bug Fixes
2065857 Jammy update: v5.15.156 upstream stable release
2065805 Jammy update: v5.15.155 upstream stable release
2065435 Jammy update: v5.15.154 upstream stable release
CVE-2024-26921 In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and oth
CVE-2024-39484 In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit f
CVE-2024-39292 In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winc
CVE-2024-36901 In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent NULL dereference in ip6_output() According to syzbot, there is a
CVE-2024-26830 In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently wh
CVE-2024-26680 In the Linux kernel, the following vulnerability has been resolved: net: atlantic: Fix DMA mapping for PTP hwts ring Function aq_ring_hwts_rx_alloc
CVE-2023-52760 In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether w
CVE-2023-52629 In the Linux kernel, the following vulnerability has been resolved: sh: push-switch: Reorder cleanup operations to avoid use-after-free bug The ori
CVE-2024-27017 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: walk over current view on netlink dump The generatio
CVE-2024-26952 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potenc
CVE-2024-26886 In the Linux kernel, the following vulnerability has been resolved: Bluetooth: af_bluetooth: Fix deadlock Attemting to do sock_lock on .recvmsg may
CVE-2023-52752 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() Skip SMB ses
CVE-2024-25742 In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This
CVE-2024-36016 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() Assuming the following
CVE-2024-23307 Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow
CVE-2024-26828 In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through
CVE-2024-24861 A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return valu
CVE-2024-26642 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets a
CVE-2024-26926 In the Linux kernel, the following vulnerability has been resolved: binder: check offset alignment in binder_get_object() Commit 6d98eb95b450 ("bin
CVE-2024-26922 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verif
CVE-2023-6039 A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel.
CVE-2024-26924 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with
CVE-2024-26643 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

Version: 5.15.0-1033.38 2024-07-30 16:07:14 UTC

  linux-mtk (5.15.0-1033.38) jammy; urgency=medium

  * jammy/linux-mtk: 5.15.0-1033.38 -proposed tracker (LP: #2072455)

  * [g350] No video output on HDMI (LP: #2072531)
    - SAUCE: (no-up) drm/mediatek: dpi: fix hdmi output for g350(mt8365)

  * [UC22][g350] systemd-backlight@backlight:14014000.dsi0.0.service: Failed to
    write system 'brightness' attribute: Invalid argument during warm-boot /
    cold-boot stress test (LP: #2069787)
    - [Config] CONFIG_DRM_PANEL_STARTEK_KD070FHFID015=m

  * [SRU] UBSAN: shift-out-of-bounds in mt6359-regulator.c:281 (LP: #2059227)
    - SAUCE: (no-up) regulator: mt6359: fix regulator mode setting

  [ Ubuntu: 5.15.0-113.123 ]

  * jammy/linux: 5.15.0-113.123 -proposed tracker (LP: #2068242)
  * CVE-2024-26924
    - netfilter: nft_set_pipapo: do not free live element
  * CVE-2024-26643
    - netfilter: nf_tables: mark set as dead when unbinding anonymous set with
      timeout

 -- Jian Hui Lee <email address hidden> Mon, 15 Jul 2024 10:28:19 +0800

CVE-2024-26924 In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with
CVE-2024-26643 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout



About   -   Send Feedback to @ubuntu_updates