UbuntuUpdates.org

Package "linux-azure"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-azure

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Linux kernel version specific cloud tools for version 4.10.0
  • Linux kernel specific documentation for version 4.10.0
  • Header files related to Linux kernel version 4.10.0
  • Header files related to Linux kernel version 4.10.0

Latest version: 4.13.0-1011.14
Release: xenial (16.04)
Level: base
Repository: main

Links

Save this URL for the latest version of "linux-azure": https://www.ubuntuupdates.org/linux-azure



Other versions of "linux-azure" in Xenial

Repository Area Version
security main 4.13.0-1011.14
updates main 4.13.0-1011.14

Packages in group

Deleted packages are displayed in grey.

linux-azure-cloud-tools-common linux-azure-doc linux-azure-headers-4.10.0-1001 linux-azure-headers-4.10.0-1003 linux-azure-headers-4.10.0-1004
linux-azure-headers-4.10.0-1005 linux-azure-headers-4.10.0-1006 linux-azure-headers-4.11.0-1001 linux-azure-headers-4.11.0-1002 linux-azure-headers-4.11.0-1003
linux-azure-headers-4.11.0-1004 linux-azure-headers-4.11.0-1005 linux-azure-headers-4.11.0-1006 linux-azure-headers-4.11.0-1007 linux-azure-headers-4.11.0-1008
linux-azure-headers-4.11.0-1009 linux-azure-headers-4.11.0-1010 linux-azure-headers-4.11.0-1011 linux-azure-headers-4.11.0-1012 linux-azure-headers-4.11.0-1013
linux-azure-headers-4.11.0-1014 linux-azure-headers-4.11.0-1015 linux-azure-headers-4.11.0-1016 linux-azure-headers-4.13.0-1001 linux-azure-headers-4.13.0-1002
linux-azure-headers-4.13.0-1003 linux-azure-headers-4.13.0-1004 linux-azure-headers-4.13.0-1005 linux-azure-headers-4.13.0-1006 linux-azure-headers-4.13.0-1008
linux-azure-headers-4.13.0-1009 linux-azure-headers-4.13.0-1010 linux-azure-headers-4.13.0-1011 linux-azure-source-4.10.0 linux-azure-tools-common

Changelog

Version: 4.13.0-1011.14 2018-02-15 18:08:55 UTC

 linux-azure (4.13.0-1011.14) xenial; urgency=medium
 .
   * linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
 .
   * [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver (LP: #1749332)
     - SAUCE: vmbus-rdma: ND142: don't wait forever for disconnection from remote
       connector
     - SAUCE: vmbus-rdma: ND142: remove idr handle before calling ND on freeing CQ
       and QP
     - SAUCE: vmbus-rdma: ND142: do not crash on idr allocation failure - warn
       instead
     - SAUCE: vmbus-rdma: ND144: don't wait forever for disconnection from remote
       connector
     - SAUCE: vmbus-rdma: ND144: remove idr handle before calling ND on freeing CQ
       and QP
     - SAUCE: vmbus-rdma: ND144: do not crash on idr allocation failure - warn
       instead
 .
   * [Hyper-V] vsock: always call vsock_init_tables() (LP: #1747970)
     - vsock: always call vsock_init_tables()
 .
   * Update the source code location in the debian package for cloud kernels
     (LP: #1747890)
     - [Debian] Update git repository URI
 .
   [ Ubuntu: 4.13.0-35.39 ]
 .
   * linux: 4.13.0-35.39 -proposed tracker (LP: #1748743)
   * CVE-2017-5715 (Spectre v2 Intel)
     - Revert "UBUNTU: SAUCE: turn off IBPB when full retpoline is present"
     - SAUCE: turn off IBRS when full retpoline is present
     - [Packaging] retpoline files must be sorted
     - [Packaging] pull in retpoline files
 .
   [ Ubuntu: 4.13.0-34.37 ]
 .
   * linux: 4.13.0-34.37 -proposed tracker (LP: #1748475)
   * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
     - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
   * KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
     (LP: #1747090)
     - KVM: s390: wire up bpb feature
   * artful 4.13 i386 kernels crash after memory hotplug remove (LP: #1747069)
     - Revert "mm, memory_hotplug: do not associate hotadded memory to zones until
       online"
   * CVE-2017-5715 (Spectre v2 Intel)
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - SAUCE: turn off IBPB when full retpoline is present
   * Artful 4.13 fixes for tun (LP: #1748846)
     - tun: call dev_get_valid_name() before register_netdevice()
     - tun: allow positive return values on dev_get_valid_name() call
     - tun/tap: sanitize TUNSETSNDBUF input
   * boot failure on AMD Raven + WestonXT (LP: #1742759)
     - SAUCE: drm/amdgpu: add atpx quirk handling (v2)
 .

Source diff to previous version
1749332 [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver
1747970 [Hyper-V] vsock: always call vsock_init_tables()
1743053 libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
1747090 KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
1747069 artful 4.13 i386 kernels crash after memory hotplug remove
1748846 Artful 4.13 fixes for tun
1742759 boot failure on AMD Raven + WesternXT
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at

Version: 4.13.0-1010.13 2018-02-07 18:08:20 UTC

 linux-azure (4.13.0-1010.13) xenial; urgency=low
 .
   * linux-azure: 4.13.0-1010.13 -proposed tracker (LP: #1746907)
 .
   * CVE-2017-5715 (Spectre v2 retpoline)
     - x86/retpoline/hyperv: Convert assembler indirect jumps
     - [Config] azure: enable CONFIG_GENERIC_CPU_VULNERABILITIES
     - [Config] azure: enable CONFIG_RETPOLINE
     - [Config] azure: disable retpoline checks for first upload
 .
   * Update the source code location in the debian package for cloud kernels
     (LP: #1747890)
     - [Debian] Update git repository URI
 .
   * [Hyper-V] linux-azure: PCI: hv: Do not sleep in compose_msi_msg()
     (LP: #1747543)
     - PCI: hv: Do not sleep in compose_msi_msg()
 .
   [ Ubuntu: 4.13.0-33.36 ]
 .
   * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)
   * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
     (Spectre v2 retpoline)
     - x86/retpoline: Fill RSB on context switch for affected CPUs
     - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
     - x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
     - x86/retpoline: Remove the esp/rsp thunk
     - x86/retpoline: Simplify vmexit_fill_RSB()
   * Missing install-time driver for QLogic QED 25/40/100Gb Ethernet NIC
     (LP: #1743638)
     - [d-i] Add qede to nic-modules udeb
   * hisi_sas: driver robustness fixes (LP: #1739807)
     - scsi: hisi_sas: fix reset and port ID refresh issues
     - scsi: hisi_sas: avoid potential v2 hw interrupt issue
     - scsi: hisi_sas: fix v2 hw underflow residual value
     - scsi: hisi_sas: add v2 hw DFX feature
     - scsi: hisi_sas: add irq and tasklet cleanup in v2 hw
     - scsi: hisi_sas: service interrupt ITCT_CLR interrupt in v2 hw
     - scsi: hisi_sas: fix internal abort slot timeout bug
     - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
     - scsi: hisi_sas: fix NULL check in SMP abort task path
     - scsi: hisi_sas: fix the risk of freeing slot twice
     - scsi: hisi_sas: kill tasklet when destroying irq in v3 hw
     - scsi: hisi_sas: complete all tasklets prior to host reset
   * [Artful/Zesty] ACPI APEI error handling bug fixes (LP: #1732990)
     - ACPI: APEI: fix the wrong iteration of generic error status block
     - ACPI / APEI: clear error status before acknowledging the error
   * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
     boot (LP: #1732804)
     - vfio/pci: Virtualize Maximum Payload Size
     - vfio/pci: Virtualize Maximum Read Request Size
   * hisi_sas: Add ATA command support for SMR disks (LP: #1739891)
     - scsi: hisi_sas: support zone management commands
   * thunderx2: i2c driver PEC and ACPI clock fixes (LP: #1738073)
     - ACPI / APD: Add clock frequency for ThunderX2 I2C controller
     - i2c: xlp9xx: Get clock frequency with clk API
     - i2c: xlp9xx: Handle I2C_M_RECV_LEN in msg->flags
   * Falkor erratum 1041 needs workaround (LP: #1738497)
     - [Config] CONFIG_QCOM_FALKOR_ERRATUM_E1041=y
     - arm64: Add software workaround for Falkor erratum 1041
   * ThunderX: TX failure unless checksum offload disabled (LP: #1736593)
     - net: thunderx: Fix TCP/UDP checksum offload for IPv6 pkts
     - net: thunderx: Fix TCP/UDP checksum offload for IPv4 pkts
   * arm64/thunderx: Unhandled context faults in ACPI mode (LP: #1736774)
     - PCI: Set Cavium ACS capability quirk flags to assert RR/CR/SV/UF
     - PCI: Apply Cavium ThunderX ACS quirk to more Root Ports
   * arm64: Unfair rwlock can stall the system (LP: #1732238)
     - locking/qrwlock: Use 'struct qrwlock' instead of 'struct __qrwlock'
     - locking/atomic: Add atomic_cond_read_acquire()
     - locking/qrwlock: Use atomic_cond_read_acquire() when spinning in qrwlock
     - locking/qrwlock, arm64: Move rwlock implementation over to qrwlocks
     - locking/qrwlock: Prevent slowpath writers getting held up by fastpath
   * Shutdown hang on 16.04 with iscsi targets (LP: #1569925)
     - scsi: libiscsi: Allow sd_shutdown on bad transport
   * bt_iter() crash due to NULL pointer (LP: #1744300)
     - blk-mq-tag: check for NULL rq when iterating tags
   * hisilicon hibmc regression due to ea642c3216cb ("drm/ttm: add io_mem_pfn
     callback") (LP: #1738334)
     - SAUCE: drm: hibmc: Initialize the hibmc_bo_driver.io_mem_pfn
   * CVE-2017-5754 ARM64 KPTI fixes
     - arm64: Add ASM_BUG()
     - arm64: consistently use bl for C exception entry
     - arm64: syscallno is secretly an int, make it official
     - arm64: Abstract syscallno manipulation
     - arm64: move non-entry code out of .entry.text
     - arm64: unwind: avoid percpu indirection for irq stack
     - arm64: unwind: disregard frame.sp when validating frame pointer
     - arm64: mm: Fix set_memory_valid() declaration
     - arm64: Convert __inval_cache_range() to area-based
     - arm64: Expose DC CVAP to userspace
     - arm64: Handle trapped DC CVAP
     - arm64: Implement pmem API support
     - arm64: uaccess: Implement *_flushcache variants
     - arm64/vdso: Support mremap() for vDSO
     - arm64: unwind: reference pt_regs via embedded stack frame
     - arm64: unwind: remove sp from struct stackframe
     - arm64: uaccess: Add the uaccess_flushcache.c file
     - arm64: fix pmem interface definition
     - arm64: compat: Remove leftover variable declaration
     - fork: allow arch-override of VMAP stack alignment
     - arm64: kernel: remove {THREAD,IRQ_STACK}_START_SP
     - arm64: factor out PAGE_* and CONT_* definitions
     - arm64: clean up THREAD_* definitions
     - arm64: clean up irq stack definitions
     - arm64: move SEGMENT_ALIGN to
     - efi/arm64: add EFI_KIMG_ALIGN
     - arm64: factor out entry stack manipulation
     - arm64: assembler: allow adr_this_cpu to use the stack pointer
     - arm64: use an irq stack pointer
     - arm64: add basic VMAP_STACK support
     - arm64: add on_accessible_stack()
     - arm64: add VMAP_STACK overflow detection
     - arm64: Convert pte handling from inline a

Source diff to previous version
1747543 [Hyper-V] linux-azure: PCI: hv: Do not sleep in compose_msi_msg()
1747507 starting VMs causing retpoline4 to reboot
1739807 hisi_sas: driver robustness fixes
1732990 [Artful/Zesty] ACPI APEI error handling bug fixes
1732804 [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to boot
1739891 hisi_sas: Add ATA command support for SMR disks
1738073 thunderx2: i2c driver PEC and ACPI clock fixes
1738497 Falkor erratum 1041 needs workaround
1736593 ThunderX: TX failure unless checksum offload disabled
1736774 arm64/thunderx: Unhandled context faults in ACPI mode
1732238 arm64: Unfair rwlock can stall the system
1744300 bt_iter() crash due to NULL pointer
1738334 hisilicon hibmc regression due to ea642c3216cb (\
1747263 [artful] panic in update_stack_state when reading /proc/\u003cpid\u003e/stack on i386
1745118 Unable to boot with i386 4.13.0-25 / 4.13.0-26 / 4.13.0-31 kernel on Xenial / Artful
1743746 4.13: unable to increase MTU configuration for GRE devices
1745338 upload urgency should be medium by default
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-5753 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker wi
CVE-2017-17712 The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized sta
CVE-2017-15115 The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off act
CVE-2017-8824 The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of servic

Version: 4.13.0-1009.12 2018-02-01 17:08:37 UTC

 linux-azure (4.13.0-1009.12) xenial; urgency=low
 .
   * linux-azure: 4.13.0-1009.12 -proposed tracker (LP: #1746726)
 .
   * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
     - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices
 .

Source diff to previous version
1743053 libata: apply MAX_SEC_1024 to all LITEON EP1 series devices

Version: 4.13.0-1008.11 2018-01-29 16:08:58 UTC

 linux-azure (4.13.0-1008.11) xenial; urgency=low
 .
   * linux-azure: 4.13.0-1008.11 -proposed tracker (LP: #1745669)
 .
   * [Hyper-V] x86/hyperv: Stop suppressing X86_FEATURE_PCID (LP: #1745247)
     - x86/hyperv: Stop suppressing X86_FEATURE_PCID
 .
   * [Hyper-V] scsi: storvsc: Spread interrupts when picking a channel for I/O
     requests (LP: #1745260)
     - SAUCE: scsi: storvsc: Spread interrupts when picking a channel for I/O
       requests
 .
   * [Hyper-V] scsi: storvsc: Increase cmd_per_lun for higher speed devices
     (LP: #1745261)
     - SAUCE: scsi: storvsc: Increase cmd_per_lun for higher speed devices
     - [Config] CONFIG_SCSI_MQ_DEFAULT=y

Source diff to previous version
1745247 [Hyper-V] x86/hyperv: Stop suppressing X86_FEATURE_PCID
1745260 [Hyper-V] scsi: storvsc: Spread interrupts when picking a channel for I/O requests
1745261 [Hyper-V] scsi: storvsc: Increase cmd_per_lun for higher speed devices

Version: 4.13.0-1006.8 2018-01-12 19:08:32 UTC

 linux-azure (4.13.0-1006.8) xenial; urgency=low
 .
   * linux-azure: 4.13.0-1006.8 -proposed tracker (LP: #1742723)
 .
 .
   [ Ubuntu: 4.13.0-29.32 ]
 .
   * linux: 4.13.0-29.32 -proposed tracker (LP: #1742722)
   * CVE-2017-5754
     - Revert "x86/cpu: Implement CPU vulnerabilites sysfs functions"
     - Revert "sysfs/cpu: Fix typos in vulnerability documentation"
     - Revert "sysfs/cpu: Add vulnerability folder"
     - Revert "UBUNTU: [Config] updateconfigs to enable
       GENERIC_CPU_VULNERABILITIES"
 .
   [ Ubuntu: 4.13.0-28.31 ]
 .
   * CVE-2017-5753
     - SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit
   * CVE-2017-5715
     - SAUCE: x86/kvm: Fix stuff_RSB() for 32-bit
 .
   [ Ubuntu: 4.13.0-27.30 ]
 .
   * CVE-2017-5753
     - locking/barriers: introduce new memory barrier gmb()
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - userns: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/kvm: Pad RSB on VM transition
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/syscall: Clear unused extra registers on syscall entrance
     - x86/syscall: Clear unused extra registers on 32-bit compatible syscall
       entrance
     - x86/entry: Use retpoline for syscall's indirect calls
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - x86/svm: Add code to clobber the RSB on VM exit
     - x86/svm: Add code to clear registers on VM exit
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - powerpc: add gmb barrier
     - s390/spinlock: add gmb memory barrier
     - x86/microcode/AMD: Add support for fam17h microcode loading
   * CVE-2017-5715
     - locking/barriers: introduce new memory barrier gmb()
     - bpf: prevent speculative execution in eBPF interpreter
     - x86, bpf, jit: prevent speculative execution when JIT is enabled
     - uvcvideo: prevent speculative execution
     - carl9170: prevent speculative execution
     - p54: prevent speculative execution
     - qla2xxx: prevent speculative execution
     - cw1200: prevent speculative execution
     - Thermal/int340x: prevent speculative execution
     - userns: prevent speculative execution
     - ipv6: prevent speculative execution
     - fs: prevent speculative execution
     - net: mpls: prevent speculative execution
     - udf: prevent speculative execution
     - x86/feature: Enable the x86 feature to control Speculation
     - x86/feature: Report presence of IBPB and IBRS control
     - x86/enter: MACROS to set/clear IBRS and set IBPB
     - x86/enter: Use IBRS on syscall and interrupts
     - x86/idle: Disable IBRS entering idle and enable it on wakeup
     - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
     - x86/mm: Set IBPB upon context switch
     - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
     - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
     - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
     - x86/kvm: Set IBPB when switching VM
     - x86/kvm: Toggle IBRS on VM entry and exit
     - x86/kvm: Pad RSB on VM transition
     - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
     - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
     - x86/syscall: Clear unused extra registers on syscall entrance
     - x86/syscall: Clear unused extra registers on 32-bit compatible syscall
       entrance
     - x86/entry: Use retpoline for syscall's indirect calls
     - x86/cpu/AMD: Add speculative control support for AMD
     - x86/microcode: Extend post microcode reload to support IBPB feature
     - KVM: SVM: Do not intercept new speculative control MSRs
     - x86/svm: Set IBRS value on VM entry and exit
     - x86/svm: Set IBPB when running a different VCPU
     - KVM: x86: Add speculative control CPUID support for guests
     - x86/svm: Add code to clobber the RSB on VM exit
     - x86/svm: Add code to clear registers on VM exit
     - x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature
     - powerpc: add gmb barrier
     - s390/spinlock: add gmb memory barrier
     - x86/microcode/AMD: Add support for fam17h microcode loading
   * CVE-2017-5754
     - x86/pti: Enable PTI by default
     - x86/pti: Make sure the user/kernel PTEs match
     - x86/dumpstack: Fix partial register dumps
     - x

1742772 powerpc: flush L1D on return to use
1742771 s390: add ppa to kernel entry/exit
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-5753 Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker wi
CVE-2017-5715 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at



About   -   Send Feedback to @ubuntu_updates