Package "linux-hwe-edge"
WARNING: the "linux-hwe-edge" package was deleted from this repository
Name: |
linux-hwe-edge
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
|
Latest version: |
*DELETED* |
Release: |
xenial (16.04) |
Level: |
base |
Repository: |
main |
Links
Other versions of "linux-hwe-edge" in Xenial
Changelog
linux-hwe-edge (4.13.0-23.27~16.04.1) xenial; urgency=low
.
* linux-hwe-edge: 4.13.0-23.27~16.04.1 -proposed tracker (LP: #1741560)
.
* linux: 4.13.0-23.27 -proposed tracker (LP: #1741556)
.
[ Kleber Sacilotto de Souza ]
* CVE-2017-5754
- x86/mm: Add the 'nopcid' boot option to turn off PCID
- x86/mm: Enable CR4.PCIDE on supported systems
- x86/mm: Document how CR4.PCIDE restore works
- x86/entry/64: Refactor IRQ stacks and make them NMI-safe
- x86/entry/64: Initialize the top of the IRQ stack before switching stacks
- x86/entry/64: Add unwind hint annotations
- xen/x86: Remove SME feature in PV guests
- x86/xen/64: Rearrange the SYSCALL entries
- irq: Make the irqentry text section unconditional
- x86/xen/64: Fix the reported SS and CS in SYSCALL
- x86/paravirt/xen: Remove xen_patch()
- x86/traps: Simplify pagefault tracing logic
- x86/idt: Unify gate_struct handling for 32/64-bit kernels
- x86/asm: Replace access to desc_struct:a/b fields
- x86/xen: Get rid of paravirt op adjust_exception_frame
- x86/paravirt: Remove no longer used paravirt functions
- x86/entry: Fix idtentry unwind hint
- x86/mm/64: Initialize CR4.PCIDE early
- objtool: Add ORC unwind table generation
- objtool, x86: Add facility for asm code to provide unwind hints
- x86/unwind: Add the ORC unwinder
- x86/kconfig: Consolidate unwinders into multiple choice selection
- objtool: Upgrade libelf-devel warning to error for CONFIG_ORC_UNWINDER
- x86/ldt/64: Refresh DS and ES when modify_ldt changes an entry
- x86/mm: Give each mm TLB flush generation a unique ID
- x86/mm: Track the TLB's tlb_gen and update the flushing algorithm
- x86/mm: Rework lazy TLB mode and TLB freshness tracking
- x86/mm: Implement PCID based optimization: try to preserve old TLB entries
using PCID
- x86/mm: Factor out CR3-building code
- x86/mm/64: Stop using CR3.PCID == 0 in ASID-aware code
- x86/mm: Flush more aggressively in lazy TLB mode
- Revert "x86/mm: Stop calling leave_mm() in idle code"
- kprobes/x86: Set up frame pointer in kprobe trampoline
- x86/tracing: Introduce a static key for exception tracing
- x86/boot: Add early cmdline parsing for options with arguments
- mm, x86/mm: Fix performance regression in get_user_pages_fast()
- x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
- objtool: Don't report end of section error after an empty unwind hint
- x86/head: Remove confusing comment
- x86/head: Remove unused 'bad_address' code
- x86/head: Fix head ELF function annotations
- x86/boot: Annotate verify_cpu() as a callable function
- x86/xen: Fix xen head ELF annotations
- x86/xen: Add unwind hint annotations
- x86/head: Add unwind hint annotations
- ACPI / APEI: adjust a local variable type in ghes_ioremap_pfn_irq()
- x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
- x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state'
tracepoints
- x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
- x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
- bitops: Add clear/set_bit32() to linux/bitops.h
- x86/cpuid: Add generic table for CPUID dependencies
- x86/fpu: Parse clearcpuid= as early XSAVE argument
- x86/fpu: Make XSAVE check the base CPUID features before enabling
- x86/fpu: Remove the explicit clearing of XSAVE dependent features
- x86/platform/UV: Convert timers to use timer_setup()
- objtool: Print top level commands on incorrect usage
- x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
- x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
- mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
- x86/kasan: Use the same shadow offset for 4- and 5-level paging
- x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and
CONFIG_XEN_PVH=y
- x86/xen: Drop 5-level paging support code from the XEN_PV code
- ACPI / APEI: remove the unused dead-code for SEA/NMI notification type
- x86/asm: Don't use the confusing '.ifeq' directive
- x86/build: Beautify build log of syscall headers
- x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to
'nr_pages'
- x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
- x86/mm: Relocate page fault error codes to traps.h
- x86/boot: Relocate definition of the initial state of CR0
- ptrace,x86: Make user_64bit_mode() available to 32-bit builds
- x86/entry/64: Remove the restore_c_regs_and_iret label
- x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
- x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
- x86/entry/64: Simplify reg restore code in the standard IRET paths
- x86/entry/64: Shrink paranoid_exit_restore and make labels local
- x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
- x86/entry/64: Merge the fast and slow SYSRET paths
- x86/entry/64: Use POP instead of MOV to restore regs on NMI return
- x86/entry/64: Remove the RESTORE_..._REGS infrastructure
- xen, x86/entry/64: Add xen NMI trap entry
- x86/entry/64: De-Xen-ify our NMI code
- x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of
native_load_sp0()
- x86/entry/64: Pass SP0 directly to load_sp0()
- x86/entry: Add task_top_of_stack() to find the top of a task's stack
- x86/xen/64, x86/entry/64: Clean up SP code in cpu_initialize_context()
- x86/entry/64: Stop initializing TSS.sp0 at boot
- x86/entry/64: Remove all remaining direct thread_struct::sp0 reads
- x86/entry/32: Fix cpu_current_top_of_stack initialization at boot
- x86/
|
1734147 |
Ubuntu 17.10 corrupting BIOS - many LENOVO laptops models |
CVE-2017-5754 |
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at |
CVE-2017-17862 |
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This beh |
CVE-2017-17864 |
kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data |
CVE-2017-16995 |
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corrupt |
CVE-2017-17863 |
kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows |
|
About
-
Send Feedback to @ubuntu_updates