UbuntuUpdates.org

Package "linux-nvidia-tegra"

Name: linux-nvidia-tegra

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0
  • Header files related to Linux kernel version 5.15.0

Latest version: 5.15.0-1046.46
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "linux-nvidia-tegra" in Jammy

Repository Area Version
security universe 5.15.0-1046.46
proposed universe 5.15.0-1047.47

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.15.0-1046.46 2025-10-01 03:07:30 UTC

  linux-nvidia-tegra (5.15.0-1046.46) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1046.46 -proposed tracker (LP: #2123981)

  [ Ubuntu-realtime: 5.15.0-1093.102 ]

  * jammy/linux-realtime: 5.15.0-1093.102 -proposed tracker (LP: #2123985)
  [ Ubuntu: 5.15.0-157.167 ]
  * jammy/linux: 5.15.0-157.167 -proposed tracker (LP: #2124010)
  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
  * CVE-2025-38477
    - net/sched: sch_qfq: Fix race condition on qfq_aggregate
    - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
      qfq_delete_class
  * CVE-2025-38617
    - net/packet: fix a race in packet_set_ring() and packet_notifier()
  * CVE-2025-38618
    - vsock: Do not allow binding to VMADDR_PORT_ANY

 -- Noah Wager <email address hidden> Wed, 24 Sep 2025 15:56:20 -0600

Source diff to previous version
1786013 Packaging resync
CVE-2025-38477 In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can oc
CVE-2025-38617 In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_s
CVE-2025-38618 In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to au

Version: 5.15.0-1045.45 2025-09-23 17:07:14 UTC

  linux-nvidia-tegra (5.15.0-1045.45) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1045.45 -proposed tracker (LP: #2120069)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] debian.nvidia-tegra/dkms-versions -- update from kernel-
      versions (main/2025.08.11)

  [ Ubuntu-realtime: 5.15.0-1092.101 ]

  * jammy/linux-realtime: 5.15.0-1092.101 -proposed tracker (LP: #2120073)
  [ Ubuntu: 5.15.0-156.166 ]
  * jammy/linux: 5.15.0-156.166 -proposed tracker (LP: #2120207)
  * minimal kernel lacks modules for blk disk in arm64 openstack environments
    where config_drive is required (LP: #2118499)
    - [Config] Enable SYM53C8XX_2 on arm64
  [ Ubuntu: 5.15.0-154.164 ]
  * jammy/linux: 5.15.0-154.164 -proposed tracker (LP: #2120098)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.08.11)
  * warning at iommu_dma_unmap_page when running ibv_rc_pingpong
    (LP: #2107816)
    - RDMA/mlx5: Fix a WARN during dereg_mr for DM type
  * dmesg flooded with errors: amdgpu: DP AUX transfer fail:4 (LP: #2115238)
    - drm/amd/display: Avoid flooding unnecessary info messages
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995)
    - ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode
    - fix proc_sys_compare() handling of in-lookup dentries
    - vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also
      `transport_local`
    - net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap
    - net: phy: smsc: Fix link failure in forced mode with Auto-MDIX
    - atm: clip: Fix memory leak of struct clip_vcc.
    - ice: safer stats processing
    - rxrpc: Fix oops due to non-existence of prealloc backlog struct
    - bpf: fix precision backtracking instruction iteration
    - bpf, sockmap: Fix skb refcnt race after locking changes
    - xen: replace xen_remap() with memremap()
    - x86/mce/amd: Fix threshold limit reset
    - x86/mce: Don't remove sysfs if thresholding sysfs init fails
    - x86/mce: Make sure CMCI banks are cleared during shutdown on Intel
    - gre: Fix IPv6 multicast route creation.
    - pinctrl: qcom: msm: mark certain pins as invalid for interrupts
    - drm/sched: Increment job count before swapping tail spsc queue
    - drm/gem: Fix race in drm_gem_handle_create_tail()
    - Revert "ACPI: battery: negate current when discharging"
    - btrfs: propagate last_unlink_trans earlier when doing a rmdir
    - btrfs: use btrfs_record_snapshot_destroy() during rmdir
    - RDMA/mlx5: Fix vport loopback for MPV device
    - pwm: mediatek: Ensure to disable clocks in error path
    - netlink: Fix rmem check in netlink_broadcast_deliver().
    - netlink: make sure we allow at least one dump skb
    - xhci: Allow RPM on the USB controller (1022:43f7) by default
    - usb: xhci: quirk for data loss in ISOC transfers
    - xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS
    - Input: xpad - support Acer NGR 200 Controller
    - usb:cdnsp: remove TRB_FLUSH_ENDPOINT command
    - usb: cdnsp: Replace snprintf() with the safer scnprintf() variant
    - usb: cdnsp: Fix issue with CV Bad Descriptor test
    - usb: dwc3: Abort suspend on soft disconnect failure
    - dma-buf: add dma_resv_for_each_fence_unlocked v8
    - dma-buf: use new iterator in dma_resv_wait_timeout
    - dma-buf: fix timeout handling in dma_resv_wait_timeout v2
    - wifi: zd1211rw: Fix potential NULL pointer dereference in
      zd_mac_tx_to_dev()
    - smb: server: make use of rdma_destroy_qp()
    - ksmbd: fix a mount write count leak in ksmbd_vfs_kern_path_locked()
    - net: appletalk: Fix device refcount leak in atrtr_create()
    - net: phy: microchip: limit 100M workaround to link-down events on
      LAN88xx
    - can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to
      debug level
    - net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam()
    - bnxt_en: Fix DCB ETS validation
    - atm: idt77252: Add missing `dma_map_error()`
    - um: vector: Reduce stack usage in vector_eth_configure()
    - net: usb: qmi_wwan: add SIMCom 8230C composition
    - HID: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2
    - vt: add missing notification when switching back to text mode
    - HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY
    - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras
    - Input: atkbd - do not skip atkbd_deactivate() when skipping
      ATKBD_CMD_GETID
    - x86/mm: Disable hugetlb page table sharing on 32-bit
    - Linux 5.15.189
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38067
    - rseq: Fix segfault on registration when rseq_cs is non-zero
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38074
    - vhost-scsi: protect vq->log_used with vq->mutex
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38439
    - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38441
    - netfilter: flowtable: account for Ethernet header in
      nf_flow_pppoe_proto()
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38443
    - nbd: fix uaf in nbd_genl_connect() error path
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38444
    - raid10: cleanup memleak at raid10_make_request
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38445
    - md/raid1: Fix stack memory use after return in raid1_reshape
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38375
    - virtio-net: ensure the received length does not exceed allocated size
  * Jammy update: v5.15.189 upstream stable release (LP: #2118995) //
    CVE-2025-38448
    - usb: gadget: u_ser

Source diff to previous version
1786013 Packaging resync
2118499 minimal kernel lacks modules for blk disk in arm64 openstack environments where config_drive is required
2107816 warning at iommu_dma_unmap_page when running ibv_rc_pingpong
2118995 Jammy update: v5.15.189 upstream stable release
2118993 Jammy update: v5.15.188 upstream stable release
2118977 Jammy update: v5.15.187 upstream stable release
2116904 Jammy update: v5.15.186 upstream stable release
2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2025-38067 In the Linux kernel, the following vulnerability has been resolved: rseq: Fix segfault on registration when rseq_cs is non-zero The rseq_cs field i
CVE-2025-38074 In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: protect vq->log_used with vq->mutex The vhost-scsi completion path
CVE-2025-38439 In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT When transmitting an XDP_
CVE-2025-38441 In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() syzb
CVE-2025-38443 In the Linux kernel, the following vulnerability has been resolved: nbd: fix uaf in nbd_genl_connect() error path There is a use-after-free issue i
CVE-2025-38444 In the Linux kernel, the following vulnerability has been resolved: raid10: cleanup memleak at raid10_make_request If raid10_read_request or raid10
CVE-2025-38445 In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_resha
CVE-2025-38375 In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_li
CVE-2025-38448 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix race condition in TTY wakeup A race condition occurs
CVE-2024-44939 In the Linux kernel, the following vulnerability has been resolved: jfs: fix null ptr deref in dtInsertEntry [syzbot reported] general protection f
CVE-2024-26775 In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of th
CVE-2022-48703 In the Linux kernel, the following vulnerability has been resolved: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR In s
CVE-2025-38457 In the Linux kernel, the following vulnerability has been resolved: net/sched: Abort __tc_modify_qdisc if parent class does not exist Lion's patch
CVE-2025-38458 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() atmarpd_dev_ops does n
CVE-2025-38459 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the spla
CVE-2025-38460 In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). atmarpd is protected b
CVE-2025-38461 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_* TOCTOU Transport assignment may race with module unload.
CVE-2025-38462 In the Linux kernel, the following vulnerability has been resolved: vsock: Fix transport_{g2h,h2g} TOCTOU vsock_find_cid() and vsock_dev_do_ioctl()
CVE-2025-38464 In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_conn_close(). syzbot reported a null-ptr-deref
CVE-2025-38465 In the Linux kernel, the following vulnerability has been resolved: netlink: Fix wraparounds of sk->sk_rmem_alloc. Netlink has this pattern in some
CVE-2025-38466 In the Linux kernel, the following vulnerability has been resolved: perf: Revert to requiring CAP_SYS_ADMIN for uprobes Jann reports that uprobes c
CVE-2025-38467 In the Linux kernel, the following vulnerability has been resolved: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling If there's supp
CVE-2024-36350 A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the lea
CVE-2024-36357 A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage
CVE-2024-26726 In the Linux kernel, the following vulnerability has been resolved: btrfs: don't drop extent_map for free space inode on write error While running
CVE-2025-38245 In the Linux kernel, the following vulnerability has been resolved: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). syzbo
CVE-2025-38249 In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In sn
CVE-2025-38251 In the Linux kernel, the following vulnerability has been resolved: atm: clip: prevent NULL deref in clip_push() Blamed commit missed that vcc_dest
CVE-2025-38257 In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apq
CVE-2025-38230 In the Linux kernel, the following vulnerability has been resolved: jfs: validate AG parameters in dbMount() to prevent crashes Validate db_agheigh
CVE-2025-38262 In the Linux kernel, the following vulnerability has been resolved: tty: serial: uartlite: register uart driver in init When two instances of uart
CVE-2025-38263 In the Linux kernel, the following vulnerability has been resolved: bcache: fix NULL pointer in cache_set_flush() 1. LINELINE#1887 is some codes ab
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()

Version: 5.15.0-1044.44 2025-08-27 04:07:48 UTC

  linux-nvidia-tegra (5.15.0-1044.44) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1044.44 -proposed tracker (LP: #2119848)

  [ Ubuntu-realtime: 5.15.0-1091.100 ]

  * jammy/linux-realtime: 5.15.0-1091.100 -proposed tracker (LP: #2119852)
  [ Ubuntu: 5.15.0-153.163 ]
  * jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)
  * CVE-2024-57996 // CVE-2025-37752
    - net_sched: sch_sfq: annotate data-races around q->perturb_period
    - net_sched: sch_sfq: handle bigger packets
    - net_sched: sch_sfq: don't allow 1 packet limit
    - net_sched: sch_sfq: use a temporary work area for validating
      configuration
    - net_sched: sch_sfq: move the limit validation
  * CVE-2025-38350
    - net/sched: Always pass notifications when child class becomes empty
  * CVE-2024-27407
    - fs/ntfs3: Fixed overflow check in mi_enum_attr()
  * watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
    5.15.0-144-generic (LP: #2118407)
    - fs/proc: do_task_stat: use __for_each_thread()

 -- Noah Wager <email address hidden> Thu, 21 Aug 2025 12:05:11 -0700

Source diff to previous version
2118407 watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with 5.15.0-144-generic
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2025-37752 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly
CVE-2025-38350 In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain cla
CVE-2024-27407 In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fixed overflow check in mi_enum_attr()

Version: 5.15.0-1043.43 2025-08-18 18:07:19 UTC

  linux-nvidia-tegra (5.15.0-1043.43) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1043.43 -proposed tracker (LP: #2117589)

  [ Ubuntu-realtime: 5.15.0-1090.99 ]

  * jammy/linux-realtime: 5.15.0-1090.99 -proposed tracker (LP: #2117593)
  [ Ubuntu: 5.15.0-152.162 ]
  * jammy/linux: 5.15.0-152.162 -proposed tracker (LP: #2117618)
  * [UBUNTU 22.04] kernel: Fix z17 elf platform recognition (LP: #2114450)
    - s390: add z16 elf platform
    - s390: Add z17 elf platform
  * Jammy update: v5.15.185 upstream stable release (LP: #2115240)
    - dma-mapping: avoid potential unused data compilation warning
    - cgroup: Fix compilation issue due to cgroup_mutex not being exported
    - net: enetc: refactor bulk flipping of RX buffers to separate function
    - bpf: fix possible endless loop in BPF map iteration
    - samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora
    - kconfig: merge_config: use an empty file as initfile
    - NFSv4: Check for delegation validity in
      nfs_start_delegation_return_locked()
    - tracing: Mark binary printing functions with __printf() attribute
    - mailbox: use error ret code of of_parse_phandle_with_args()
    - fbdev: fsl-diu-fb: add missing device_remove_file()
    - fbcon: Use correct erase colour for clearing in fbcon
    - fbdev: core: tileblit: Implement missing margin clearing for tileblit
    - NFSv4: Treat ENETUNREACH errors as fatal for state recovery
    - SUNRPC: rpc_clnt_set_transport() must not change the autobind setting
    - SUNRPC: rpcbind should never reset the port to the value '0'
    - thermal/drivers/qoriq: Power down TMU on system suspend
    - dql: Fix dql->limit value when reset.
    - lockdep: Fix wait context check on softirq for PREEMPT_RT
    - PCI: dwc: ep: Ensure proper iteration over outbound map windows
    - tools/build: Don't pass test log files to linker
    - pNFS/flexfiles: Report ENETDOWN as a connection error
    - PCI: vmd: Disable MSI remapping bypass under Xen
    - mmc: host: Wait for Vdd to settle on card power off
    - wifi: mt76: only mark tx-status-failed frames as ACKed on mt76x0/2
    - i2c: qup: Vote for interconnect bandwidth to DRAM
    - i2c: pxa: fix call balance of i2c->clk handling routines
    - btrfs: make btrfs_discard_workfn() block_group ref explicit
    - btrfs: avoid linker error in btrfs_find_create_tree_block()
    - btrfs: get zone unusable bytes while holding lock at
      btrfs_reclaim_bgs_work()
    - btrfs: send: return -ENAMETOOLONG when attempting a path that is too
      long
    - i3c: master: svc: Fix missing STOP for master request
    - dlm: make tcp still work in multi-link env
    - um: Store full CSGSFS and SS register from mcontext
    - um: Update min_low_pfn to match changes in uml_reserved
    - ext4: reorder capability check last
    - scsi: st: Tighten the page format heuristics with MODE SELECT
    - scsi: st: ERASE does not change tape location
    - vfio/pci: Handle INTx IRQ_NOTCONNECTED
    - tcp: reorganize tcp_in_ack_event() and tcp_count_delivered()
    - rtc: rv3032: fix EERD location
    - ASoC: mediatek: mt6359: Add stub for mt6359_accdet_enable_jack_detect
    - kbuild: fix argument parsing in scripts/config
    - crypto: octeontx2 - suppress auth failure screaming due to negative
      tests
    - dm: restrict dm device size to 2^63-512 bytes
    - xen: Add support for XenServer 6.1 platform device
    - RDMA/uverbs: Propagate errors from rdma_lookup_get_uobject()
    - posix-timers: Add cond_resched() to posix_timer_add() search loop
    - timer_list: Don't use %pK through printk()
    - netfilter: conntrack: Bound nf_conntrack sysctl writes
    - arm64/mm: Check PUD_TYPE_TABLE in pud_bad()
    - mmc: sdhci: Disable SD card clock before changing parameters
    - ipv6: save dontfrag in cork
    - auxdisplay: charlcd: Partially revert "Move hwidth and bwidth to struct
      hd44780_common"
    - ASoC: qcom: sm8250: explicitly set format in sm8250_be_hw_params_fixup()
    - cpufreq: tegra186: Share policy per cluster
    - arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator
    - powerpc/prom_init: Fixup missing #size-cells on PowerBook6,7
    - tcp: bring back NUMA dispersion in inet_ehash_locks_alloc()
    - rtc: ds1307: stop disabling alarms on probe
    - ieee802154: ca8210: Use proper setters and getters for bitwise types
    - ARM: tegra: Switch DSI-B clock parent to PLLD on Tegra114
    - media: c8sectpfe: Call of_node_put(i2c_bus) only once in
      c8sectpfe_probe()
    - remoteproc: qcom_wcnss: Handle platforms with only single power domain
    - drm/amdgpu: Do not program AGP BAR regs under SRIOV in gfxhub_v1_0.c
    - pinctrl: bcm281xx: Use "unsigned int" instead of bare "unsigned"
    - net: ethernet: ti: cpsw_new: populate netdev of_node
    - net: pktgen: fix mpls maximum labels list parsing
    - ipv4: fib: Move fib_valid_key_len() to rtm_to_fib_config().
    - media: uvcvideo: Add sanity check to uvc_ioctl_xu_ctrl_map
    - clk: imx8mp: inform CCF of maximum frequency of clocks
    - x86/bugs: Make spectre user default depend on MITIGATION_SPECTRE_V2
    - hwmon: (gpio-fan) Add missing mutex locks
    - ARM: at91: pm: fix at91_suspend_finish for ZQ calibration
    - drm/mediatek: mtk_dpi: Add checks for reg_h_fre_con existence
    - fpga: altera-cvp: Increase credit timeout
    - PCI: brcmstb: Expand inbound window size up to 64GB
    - PCI: brcmstb: Add a softdep to MIP MSI-X driver
    - net/mlx5: Avoid report two health errors on same syndrome
    - selftests/net: have `gro.sh -t` return a correct exit code
    - drm/amdkfd: KFD release_work possible circular locking
    - net: xgene-v2: remove incorrect ACPI_PTR annotation
    - bonding: report duplicate MAC address in all situations
    - soc: ti: k3-socinfo: Do not use syscon helper to build regmap
    - x86/build: Fix broken copy command in genimage.sh when making isoimage
    - drm/amd/display: handle max_downscale_src_width fail check

Source diff to previous version
2114450 [UBUNTU 22.04] kernel: Fix z17 elf platform recognition
2115240 Jammy update: v5.15.185 upstream stable release
1786013 Packaging resync
2117395 raid10: block discard causes a NULL pointer dereference after 5.15.0-144-generic
CVE-2025-38051 In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition i
CVE-2025-38077 In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store()
CVE-2025-38078 In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix race of buffer access at PCM OSS layer The PCM OSS layer tries t
CVE-2025-38003 In the Linux kernel, the following vulnerability has been resolved: can: bcm: add missing rcu read protection for procfs content When the procfs co
CVE-2025-38004 In the Linux kernel, the following vulnerability has been resolved: can: bcm: add locking for bcm_op runtime updates The CAN broadcast manager (CAN
CVE-2025-38031 In the Linux kernel, the following vulnerability has been resolved: padata: do not leak refcount in reorder_work A recent patch that addressed a UA
CVE-2025-38079 In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - fix double free in hash_accept If accept(2) is called on s
CVE-2025-38052 In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reporte
CVE-2025-38058 In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or
CVE-2025-38034 In the Linux kernel, the following vulnerability has been resolved: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref btrfs_pre
CVE-2025-38035 In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: don't restore null sk_state_change queue->state_change is set as par
CVE-2025-38037 In the Linux kernel, the following vulnerability has been resolved: vxlan: Annotate FDB data races The 'used' and 'updated' fields in the FDB entry
CVE-2025-38061 In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() H
CVE-2025-38043 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_ffa: Set dma_mask for ffa devices Set dma_mask for FFA devices, o
CVE-2025-38044 In the Linux kernel, the following vulnerability has been resolved: media: cx231xx: set device_caps for 417 The video_device for the MPEG encoder d
CVE-2025-38065 In the Linux kernel, the following vulnerability has been resolved: orangefs: Do not truncate file size 'len' is used to store the result of i_size
CVE-2025-38066 In the Linux kernel, the following vulnerability has been resolved: dm cache: prevent BUG_ON by blocking retries on failed device resumes A cache d
CVE-2025-38068 In the Linux kernel, the following vulnerability has been resolved: crypto: lzo - Fix compression buffer overrun Unlike the decompression code, the
CVE-2025-38072 In the Linux kernel, the following vulnerability has been resolved: libnvdimm/labels: Fix divide error in nd_label_data_init() If a faulty CXL memo
CVE-2025-38048 In the Linux kernel, the following vulnerability has been resolved: virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN syzbot
CVE-2025-38075 In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix timeout on deleted connection NOPIN response timer may
CVE-2025-38083 In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race conditio
CVE-2024-50073 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-fr

Version: 5.15.0-1042.42 2025-07-29 05:08:36 UTC

  linux-nvidia-tegra (5.15.0-1042.42) jammy; urgency=medium

  * jammy/linux-nvidia-tegra: 5.15.0-1042.42 -proposed tracker (LP: #2116428)

  [ Ubuntu-realtime: 5.15.0-1089.98 ]

  * jammy/linux-realtime: 5.15.0-1089.98 -proposed tracker (LP: #2116433)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
  [ Ubuntu: 5.15.0-145.158 ]
  * jammy/linux: 5.15.0-145.158 -proposed tracker (LP: #2116458)
  * CVE-2025-38083
    - net_sched: prio: fix a race in prio_tune()
  * CVE-2024-50073
    - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux

 -- Noah Wager <email address hidden> Tue, 22 Jul 2025 08:39:32 -0700

1786013 Packaging resync
CVE-2025-38083 In the Linux kernel, the following vulnerability has been resolved: net_sched: prio: fix a race in prio_tune() Gerrard Tai reported a race conditio
CVE-2024-50073 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-fr



About   -   Send Feedback to @ubuntu_updates