UbuntuUpdates.org

Package "linux-hwe-edge"

This package belongs to a PPA: Canonical Kernel Team




Name: linux-hwe-edge

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: xenial (16.04)
Level: base
Repository: main

Links



Other versions of "linux-hwe-edge" in Xenial

Repository Area Version
security main 4.11.0-13.19~16.04.1
updates main 4.11.0-13.19~16.04.1

Changelog

Version: *DELETED* 2018-04-05 16:08:42 UTC
No changelog for deleted or moved packages.

Version: 4.15.0-13.14~16.04.1 2018-03-17 07:08:14 UTC

 linux-hwe-edge (4.15.0-13.14~16.04.1) xenial; urgency=medium
 .
   * linux-hwe-edge: 4.15.0-13.14~16.04.1 -proposed tracker (LP: #1756480)
 .
   * devpts: handle bind-mounts (LP: #1755857)
     - SAUCE: devpts: hoist out check for DEVPTS_SUPER_MAGIC
     - SAUCE: devpts: resolve devpts bind-mounts
     - SAUCE: devpts: comment devpts_mntget()
     - SAUCE: selftests: add devpts selftests
 .
   * [bionic][arm64] d-i: add hisi_sas_v3_hw to scsi-modules (LP: #1756103)
     - d-i: add hisi_sas_v3_hw to scsi-modules
 .
   * [Bionic][ARM64] enable ROCE and HNS3 driver support for hip08 SoC
     (LP: #1756097)
     - RDMA/hns: Refactor eq code for hip06
     - RDMA/hns: Add eq support of hip08
     - RDMA/hns: Add detailed comments for mb() call
     - RDMA/hns: Add rq inline data support for hip08 RoCE
     - RDMA/hns: Update the usage of sr_max and rr_max field
     - RDMA/hns: Set access flags of hip08 RoCE
     - RDMA/hns: Filter for zero length of sge in hip08 kernel mode
     - RDMA/hns: Fix QP state judgement before sending work requests
     - RDMA/hns: Assign dest_qp when deregistering mr
     - RDMA/hns: Fix endian problems around imm_data and rkey
     - RDMA/hns: Assign the correct value for tx_cqn
     - RDMA/hns: Create gsi qp in hip08
     - RDMA/hns: Add gsi qp support for modifying qp in hip08
     - RDMA/hns: Fill sq wqe context of ud type in hip08
     - RDMA/hns: Assign zero for pkey_index of wc in hip08
     - RDMA/hns: Update the verbs of polling for completion
     - RDMA/hns: Set the guid for hip08 RoCE device
     - net: hns3: Refactor of the reset interrupt handling logic
     - net: hns3: Add reset service task for handling reset requests
     - net: hns3: Refactors the requested reset & pending reset handling code
     - net: hns3: Add HNS3 VF IMP(Integrated Management Proc) cmd interface
     - net: hns3: Add mailbox support to VF driver
     - net: hns3: Add HNS3 VF HCL(Hardware Compatibility Layer) Support
     - net: hns3: Add HNS3 VF driver to kernel build framework
     - net: hns3: Unified HNS3 {VF|PF} Ethernet Driver for hip08 SoC
     - net: hns3: Add mailbox support to PF driver
     - net: hns3: Change PF to add ring-vect binding & resetQ to mailbox
     - net: hns3: Add mailbox interrupt handling to PF driver
     - net: hns3: add support to query tqps number
     - net: hns3: add support to modify tqps number
     - net: hns3: change the returned tqp number by ethtool -x
     - net: hns3: free the ring_data structrue when change tqps
     - net: hns3: get rss_size_max from configuration but not hardcode
     - net: hns3: add a mask initialization for mac_vlan table
     - net: hns3: add vlan offload config command
     - net: hns3: add ethtool related offload command
     - net: hns3: add handling vlan tag offload in bd
     - net: hns3: cleanup mac auto-negotiation state query
     - net: hns3: fix for getting auto-negotiation state in hclge_get_autoneg
     - net: hns3: add support for set_pauseparam
     - net: hns3: add support to update flow control settings after autoneg
     - net: hns3: add Asym Pause support to phy default features
     - net: hns3: add support for querying advertised pause frame by ethtool ethx
     - net: hns3: Increase the default depth of bucket for TM shaper
     - net: hns3: change TM sched mode to TC-based mode when SRIOV enabled
     - net: hns3: hns3_get_channels() can be static
     - net: hns3: Add ethtool interface for vlan filter
     - net: hns3: Disable VFs change rxvlan offload status
     - net: hns3: Unify the strings display of packet statistics
     - net: hns3: Fix spelling errors
     - net: hns3: Remove repeat statistic of rx_errors
     - net: hns3: Modify the update period of packet statistics
     - net: hns3: Mask the packet statistics query when NIC is down
     - net: hns3: Fix an error of total drop packet statistics
     - net: hns3: Fix a loop index error of tqp statistics query
     - net: hns3: Fix an error macro definition of HNS3_TQP_STAT
     - net: hns3: Remove a useless member of struct hns3_stats
     - net: hns3: Add packet statistics of netdev
     - net: hns3: Fix a response data read error of tqp statistics query
     - net: hns3: fix for updating fc_mode_last_time
     - net: hns3: fix for setting MTU
     - net: hns3: fix for changing MTU
     - net: hns3: add MTU initialization for hardware
     - net: hns3: fix for not setting pause parameters
     - net: hns3: remove redundant semicolon
     - net: hns3: Add more packet size statisctics
     - Revert "net: hns3: Add packet statistics of netdev"
     - net: hns3: report the function type the same line with hns3_nic_get_stats64
     - net: hns3: add ethtool_ops.get_channels support for VF
     - net: hns3: remove TSO config command from VF driver
     - net: hns3: add ethtool_ops.get_coalesce support to PF
     - net: hns3: add ethtool_ops.set_coalesce support to PF
     - net: hns3: refactor interrupt coalescing init function
     - net: hns3: refactor GL update function
     - net: hns3: remove unused GL setup function
     - net: hns3: change the unit of GL value macro
     - net: hns3: add int_gl_idx setup for TX and RX queues
     - net: hns3: add feature check when feature changed
     - net: hns3: check for NULL function pointer in hns3_nic_set_features
     - net: hns: Fix for variable may be used uninitialized warnings
     - net: hns3: add support for get_regs
     - net: hns3: add manager table initialization for hardware
     - net: hns3: add ethtool -p support for fiber port
     - net: hns3: add net status led support for fiber port
     - net: hns3: converting spaces into tabs to avoid checkpatch.pl warning
     - net: hns3: add get/set_coalesce support to VF
     - net: hns3: add int_gl_idx setup for VF
     - [Config]: enable CONFIG_HNS3_HCLGEVF as module.
 .
   * [Bionic][ARM64] add RAS extension and SDEI features (LP: #1756096)
     - KVM: arm64: Store vcpu on the stack during __guest_enter()
     - KVM:

Source diff to previous version
1755857 devpts: handle bind-mounts
1756103 [bionic][arm64] d-i: add hisi_sas_v3_hw to scsi-modules
1756097 [Bionic][ARM64] enable ROCE and HNS3 driver support for hip08 SoC
1756096 [Bionic][ARM64] add RAS extension and SDEI features
1756094 [Bionic][ARM64] PCI and SAS driver patches for hip08 SoCs
1754580 [CVE] Spectre: System Z {kernel} UBUNTU18.04
1753424 s390/crypto: Fix kernel crash on aes_s390 module remove
1752182 [Feature]Update Ubuntu 18.04 lpfc FC driver with 32/64GB HBA support and bug fixes
1756100 Bionic update to 4.15.10 stable release
1752061 nfp: prioritize stats updates
1753371 Ubuntu 18.04 - Kernel crash on nvme subsystem-reset /dev/nvme0 (Bolt / NVMe)
1755595 sbsa watchdog crashes thunderx2 system
1755132 KVM: s390: add vcpu stat counters for many instruction
1747572 CIFS SMB2/SMB3 does not work for domain based DFS
1754076 i2c-thunderx: erroneous error message \
1750441 Boston-LC:bos1u1: Stress test on Qlogic Fibre Channel on Ubuntu KVM guest that caused KVM host crashed in qlt_free_session_done call
1752236 Ubuntu 18.04 - Performance: Radix page fault handler bug in KVM
1755158 Fix ARC hit rate
1755275 Bionic update to 4.15.9 stable release
1755179 Bionic update to 4.15.8 stable release
1753288 ZFS setgid broken on 0.7
1754297 /proc/kallsyms prints \
CVE-2018-8043 The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availabilit

Version: 4.13.0-25.29~16.04.2 2018-01-09 21:09:07 UTC

 linux-hwe-edge (4.13.0-25.29~16.04.2) xenial; urgency=low
 .
   * linux-hwe-edge: 4.13.0-25.29~16.04.2 -proposed tracker (LP: #1741960)
 .
   * linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
 .
   * CVE-2017-5754
     - Revert "UBUNTU: [Config] updateconfigs to enable PTI"
     - [Config] Enable PTI with UNWINDER_FRAME_POINTER
 .
 linux (4.13.0-24.28) artful; urgency=low
 .
   * linux: 4.13.0-24.28 -proposed tracker (LP: #1741745)
 .
   * CVE-2017-5754
     - x86/cpu, x86/pti: Do not enable PTI on AMD processors
 .
 linux (4.13.0-23.27) artful; urgency=low
 .
   * linux: 4.13.0-23.27 -proposed tracker (LP: #1741556)
 .
   [ Kleber Sacilotto de Souza ]
   * CVE-2017-5754
     - x86/mm: Add the 'nopcid' boot option to turn off PCID
     - x86/mm: Enable CR4.PCIDE on supported systems
     - x86/mm: Document how CR4.PCIDE restore works
     - x86/entry/64: Refactor IRQ stacks and make them NMI-safe
     - x86/entry/64: Initialize the top of the IRQ stack before switching stacks
     - x86/entry/64: Add unwind hint annotations
     - xen/x86: Remove SME feature in PV guests
     - x86/xen/64: Rearrange the SYSCALL entries
     - irq: Make the irqentry text section unconditional
     - x86/xen/64: Fix the reported SS and CS in SYSCALL
     - x86/paravirt/xen: Remove xen_patch()
     - x86/traps: Simplify pagefault tracing logic
     - x86/idt: Unify gate_struct handling for 32/64-bit kernels
     - x86/asm: Replace access to desc_struct:a/b fields
     - x86/xen: Get rid of paravirt op adjust_exception_frame
     - x86/paravirt: Remove no longer used paravirt functions
     - x86/entry: Fix idtentry unwind hint
     - x86/mm/64: Initialize CR4.PCIDE early
     - objtool: Add ORC unwind table generation
     - objtool, x86: Add facility for asm code to provide unwind hints
     - x86/unwind: Add the ORC unwinder
     - x86/kconfig: Consolidate unwinders into multiple choice selection
     - objtool: Upgrade libelf-devel warning to error for CONFIG_ORC_UNWINDER
     - x86/ldt/64: Refresh DS and ES when modify_ldt changes an entry
     - x86/mm: Give each mm TLB flush generation a unique ID
     - x86/mm: Track the TLB's tlb_gen and update the flushing algorithm
     - x86/mm: Rework lazy TLB mode and TLB freshness tracking
     - x86/mm: Implement PCID based optimization: try to preserve old TLB entries
       using PCID
     - x86/mm: Factor out CR3-building code
     - x86/mm/64: Stop using CR3.PCID == 0 in ASID-aware code
     - x86/mm: Flush more aggressively in lazy TLB mode
     - Revert "x86/mm: Stop calling leave_mm() in idle code"
     - kprobes/x86: Set up frame pointer in kprobe trampoline
     - x86/tracing: Introduce a static key for exception tracing
     - x86/boot: Add early cmdline parsing for options with arguments
     - mm, x86/mm: Fix performance regression in get_user_pages_fast()
     - x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
     - objtool: Don't report end of section error after an empty unwind hint
     - x86/head: Remove confusing comment
     - x86/head: Remove unused 'bad_address' code
     - x86/head: Fix head ELF function annotations
     - x86/boot: Annotate verify_cpu() as a callable function
     - x86/xen: Fix xen head ELF annotations
     - x86/xen: Add unwind hint annotations
     - x86/head: Add unwind hint annotations
     - ACPI / APEI: adjust a local variable type in ghes_ioremap_pfn_irq()
     - x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
     - x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state'
       tracepoints
     - x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
     - x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
     - bitops: Add clear/set_bit32() to linux/bitops.h
     - x86/cpuid: Add generic table for CPUID dependencies
     - x86/fpu: Parse clearcpuid= as early XSAVE argument
     - x86/fpu: Make XSAVE check the base CPUID features before enabling
     - x86/fpu: Remove the explicit clearing of XSAVE dependent features
     - x86/platform/UV: Convert timers to use timer_setup()
     - objtool: Print top level commands on incorrect usage
     - x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
     - x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
     - mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
     - x86/kasan: Use the same shadow offset for 4- and 5-level paging
     - x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and
       CONFIG_XEN_PVH=y
     - x86/xen: Drop 5-level paging support code from the XEN_PV code
     - ACPI / APEI: remove the unused dead-code for SEA/NMI notification type
     - x86/asm: Don't use the confusing '.ifeq' directive
     - x86/build: Beautify build log of syscall headers
     - x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to
       'nr_pages'
     - x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
     - x86/mm: Relocate page fault error codes to traps.h
     - x86/boot: Relocate definition of the initial state of CR0
     - ptrace,x86: Make user_64bit_mode() available to 32-bit builds
     - x86/entry/64: Remove the restore_c_regs_and_iret label
     - x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
     - x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
     - x86/entry/64: Simplify reg restore code in the standard IRET paths
     - x86/entry/64: Shrink paranoid_exit_restore and make labels local
     - x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
     - x86/entry/64: Merge the fast and slow SYSRET paths
     - x86/entry/64: Use POP instead of MOV to restore regs on NMI return
     - x86/entry/64: Remove the RESTORE_..._REGS infrastructure
     - xen, x86/entry/64: Add xen NMI trap entry
     - x86/entry/64: De-Xen-ify our NMI code
     - x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of
       nativ

Source diff to previous version
1734147 Ubuntu 17.10 corrupting BIOS - many LENOVO laptops models
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-17862 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This beh
CVE-2017-17864 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data
CVE-2017-16995 The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corrupt
CVE-2017-17863 kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows

Version: 4.13.0-25.29~16.04.1 2018-01-09 05:08:56 UTC

 linux-hwe-edge (4.13.0-25.29~16.04.1) xenial; urgency=low
 .
   * linux-hwe-edge: 4.13.0-25.29~16.04.1 -proposed tracker (LP: #1741960)
 .
   * linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
 .
   * CVE-2017-5754
     - Revert "UBUNTU: [Config] updateconfigs to enable PTI"
     - [Config] Enable PTI with UNWINDER_FRAME_POINTER
 .
 linux (4.13.0-24.28) artful; urgency=low
 .
   * linux: 4.13.0-24.28 -proposed tracker (LP: #1741745)
 .
   * CVE-2017-5754
     - x86/cpu, x86/pti: Do not enable PTI on AMD processors
 .
 linux (4.13.0-23.27) artful; urgency=low
 .
   * linux: 4.13.0-23.27 -proposed tracker (LP: #1741556)
 .
   [ Kleber Sacilotto de Souza ]
   * CVE-2017-5754
     - x86/mm: Add the 'nopcid' boot option to turn off PCID
     - x86/mm: Enable CR4.PCIDE on supported systems
     - x86/mm: Document how CR4.PCIDE restore works
     - x86/entry/64: Refactor IRQ stacks and make them NMI-safe
     - x86/entry/64: Initialize the top of the IRQ stack before switching stacks
     - x86/entry/64: Add unwind hint annotations
     - xen/x86: Remove SME feature in PV guests
     - x86/xen/64: Rearrange the SYSCALL entries
     - irq: Make the irqentry text section unconditional
     - x86/xen/64: Fix the reported SS and CS in SYSCALL
     - x86/paravirt/xen: Remove xen_patch()
     - x86/traps: Simplify pagefault tracing logic
     - x86/idt: Unify gate_struct handling for 32/64-bit kernels
     - x86/asm: Replace access to desc_struct:a/b fields
     - x86/xen: Get rid of paravirt op adjust_exception_frame
     - x86/paravirt: Remove no longer used paravirt functions
     - x86/entry: Fix idtentry unwind hint
     - x86/mm/64: Initialize CR4.PCIDE early
     - objtool: Add ORC unwind table generation
     - objtool, x86: Add facility for asm code to provide unwind hints
     - x86/unwind: Add the ORC unwinder
     - x86/kconfig: Consolidate unwinders into multiple choice selection
     - objtool: Upgrade libelf-devel warning to error for CONFIG_ORC_UNWINDER
     - x86/ldt/64: Refresh DS and ES when modify_ldt changes an entry
     - x86/mm: Give each mm TLB flush generation a unique ID
     - x86/mm: Track the TLB's tlb_gen and update the flushing algorithm
     - x86/mm: Rework lazy TLB mode and TLB freshness tracking
     - x86/mm: Implement PCID based optimization: try to preserve old TLB entries
       using PCID
     - x86/mm: Factor out CR3-building code
     - x86/mm/64: Stop using CR3.PCID == 0 in ASID-aware code
     - x86/mm: Flush more aggressively in lazy TLB mode
     - Revert "x86/mm: Stop calling leave_mm() in idle code"
     - kprobes/x86: Set up frame pointer in kprobe trampoline
     - x86/tracing: Introduce a static key for exception tracing
     - x86/boot: Add early cmdline parsing for options with arguments
     - mm, x86/mm: Fix performance regression in get_user_pages_fast()
     - x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
     - objtool: Don't report end of section error after an empty unwind hint
     - x86/head: Remove confusing comment
     - x86/head: Remove unused 'bad_address' code
     - x86/head: Fix head ELF function annotations
     - x86/boot: Annotate verify_cpu() as a callable function
     - x86/xen: Fix xen head ELF annotations
     - x86/xen: Add unwind hint annotations
     - x86/head: Add unwind hint annotations
     - ACPI / APEI: adjust a local variable type in ghes_ioremap_pfn_irq()
     - x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
     - x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state'
       tracepoints
     - x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
     - x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
     - bitops: Add clear/set_bit32() to linux/bitops.h
     - x86/cpuid: Add generic table for CPUID dependencies
     - x86/fpu: Parse clearcpuid= as early XSAVE argument
     - x86/fpu: Make XSAVE check the base CPUID features before enabling
     - x86/fpu: Remove the explicit clearing of XSAVE dependent features
     - x86/platform/UV: Convert timers to use timer_setup()
     - objtool: Print top level commands on incorrect usage
     - x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
     - x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
     - mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
     - x86/kasan: Use the same shadow offset for 4- and 5-level paging
     - x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and
       CONFIG_XEN_PVH=y
     - x86/xen: Drop 5-level paging support code from the XEN_PV code
     - ACPI / APEI: remove the unused dead-code for SEA/NMI notification type
     - x86/asm: Don't use the confusing '.ifeq' directive
     - x86/build: Beautify build log of syscall headers
     - x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to
       'nr_pages'
     - x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
     - x86/mm: Relocate page fault error codes to traps.h
     - x86/boot: Relocate definition of the initial state of CR0
     - ptrace,x86: Make user_64bit_mode() available to 32-bit builds
     - x86/entry/64: Remove the restore_c_regs_and_iret label
     - x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
     - x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
     - x86/entry/64: Simplify reg restore code in the standard IRET paths
     - x86/entry/64: Shrink paranoid_exit_restore and make labels local
     - x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
     - x86/entry/64: Merge the fast and slow SYSRET paths
     - x86/entry/64: Use POP instead of MOV to restore regs on NMI return
     - x86/entry/64: Remove the RESTORE_..._REGS infrastructure
     - xen, x86/entry/64: Add xen NMI trap entry
     - x86/entry/64: De-Xen-ify our NMI code
     - x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of
       nativ

Source diff to previous version
1734147 Ubuntu 17.10 corrupting BIOS - many LENOVO laptops models
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-17862 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This beh
CVE-2017-17864 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data
CVE-2017-16995 The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corrupt
CVE-2017-17863 kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows

Version: 4.13.0-24.28~16.04.1 2018-01-08 03:08:55 UTC

 linux-hwe-edge (4.13.0-24.28~16.04.1) xenial; urgency=low
 .
   * linux-hwe-edge: 4.13.0-24.28~16.04.1 -proposed tracker (LP: #1741749)
 .
   * linux: 4.13.0-24.28 -proposed tracker (LP: #1741745)
 .
   * CVE-2017-5754
     - x86/cpu, x86/pti: Do not enable PTI on AMD processors
 .
 linux (4.13.0-23.27) artful; urgency=low
 .
   * linux: 4.13.0-23.27 -proposed tracker (LP: #1741556)
 .
   [ Kleber Sacilotto de Souza ]
   * CVE-2017-5754
     - x86/mm: Add the 'nopcid' boot option to turn off PCID
     - x86/mm: Enable CR4.PCIDE on supported systems
     - x86/mm: Document how CR4.PCIDE restore works
     - x86/entry/64: Refactor IRQ stacks and make them NMI-safe
     - x86/entry/64: Initialize the top of the IRQ stack before switching stacks
     - x86/entry/64: Add unwind hint annotations
     - xen/x86: Remove SME feature in PV guests
     - x86/xen/64: Rearrange the SYSCALL entries
     - irq: Make the irqentry text section unconditional
     - x86/xen/64: Fix the reported SS and CS in SYSCALL
     - x86/paravirt/xen: Remove xen_patch()
     - x86/traps: Simplify pagefault tracing logic
     - x86/idt: Unify gate_struct handling for 32/64-bit kernels
     - x86/asm: Replace access to desc_struct:a/b fields
     - x86/xen: Get rid of paravirt op adjust_exception_frame
     - x86/paravirt: Remove no longer used paravirt functions
     - x86/entry: Fix idtentry unwind hint
     - x86/mm/64: Initialize CR4.PCIDE early
     - objtool: Add ORC unwind table generation
     - objtool, x86: Add facility for asm code to provide unwind hints
     - x86/unwind: Add the ORC unwinder
     - x86/kconfig: Consolidate unwinders into multiple choice selection
     - objtool: Upgrade libelf-devel warning to error for CONFIG_ORC_UNWINDER
     - x86/ldt/64: Refresh DS and ES when modify_ldt changes an entry
     - x86/mm: Give each mm TLB flush generation a unique ID
     - x86/mm: Track the TLB's tlb_gen and update the flushing algorithm
     - x86/mm: Rework lazy TLB mode and TLB freshness tracking
     - x86/mm: Implement PCID based optimization: try to preserve old TLB entries
       using PCID
     - x86/mm: Factor out CR3-building code
     - x86/mm/64: Stop using CR3.PCID == 0 in ASID-aware code
     - x86/mm: Flush more aggressively in lazy TLB mode
     - Revert "x86/mm: Stop calling leave_mm() in idle code"
     - kprobes/x86: Set up frame pointer in kprobe trampoline
     - x86/tracing: Introduce a static key for exception tracing
     - x86/boot: Add early cmdline parsing for options with arguments
     - mm, x86/mm: Fix performance regression in get_user_pages_fast()
     - x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
     - objtool: Don't report end of section error after an empty unwind hint
     - x86/head: Remove confusing comment
     - x86/head: Remove unused 'bad_address' code
     - x86/head: Fix head ELF function annotations
     - x86/boot: Annotate verify_cpu() as a callable function
     - x86/xen: Fix xen head ELF annotations
     - x86/xen: Add unwind hint annotations
     - x86/head: Add unwind hint annotations
     - ACPI / APEI: adjust a local variable type in ghes_ioremap_pfn_irq()
     - x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
     - x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state'
       tracepoints
     - x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
     - x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
     - bitops: Add clear/set_bit32() to linux/bitops.h
     - x86/cpuid: Add generic table for CPUID dependencies
     - x86/fpu: Parse clearcpuid= as early XSAVE argument
     - x86/fpu: Make XSAVE check the base CPUID features before enabling
     - x86/fpu: Remove the explicit clearing of XSAVE dependent features
     - x86/platform/UV: Convert timers to use timer_setup()
     - objtool: Print top level commands on incorrect usage
     - x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
     - x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
     - mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
     - x86/kasan: Use the same shadow offset for 4- and 5-level paging
     - x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and
       CONFIG_XEN_PVH=y
     - x86/xen: Drop 5-level paging support code from the XEN_PV code
     - ACPI / APEI: remove the unused dead-code for SEA/NMI notification type
     - x86/asm: Don't use the confusing '.ifeq' directive
     - x86/build: Beautify build log of syscall headers
     - x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to
       'nr_pages'
     - x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
     - x86/mm: Relocate page fault error codes to traps.h
     - x86/boot: Relocate definition of the initial state of CR0
     - ptrace,x86: Make user_64bit_mode() available to 32-bit builds
     - x86/entry/64: Remove the restore_c_regs_and_iret label
     - x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
     - x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
     - x86/entry/64: Simplify reg restore code in the standard IRET paths
     - x86/entry/64: Shrink paranoid_exit_restore and make labels local
     - x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
     - x86/entry/64: Merge the fast and slow SYSRET paths
     - x86/entry/64: Use POP instead of MOV to restore regs on NMI return
     - x86/entry/64: Remove the RESTORE_..._REGS infrastructure
     - xen, x86/entry/64: Add xen NMI trap entry
     - x86/entry/64: De-Xen-ify our NMI code
     - x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of
       native_load_sp0()
     - x86/entry/64: Pass SP0 directly to load_sp0()
     - x86/entry: Add task_top_of_stack() to find the top of a task's stack
     - x86/xen/64, x86/entry/64: Clean up SP code in cpu_initialize_context()
     - x86/entry/64: Sto

CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-17862 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This beh
CVE-2017-17864 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data
CVE-2017-16995 The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corrupt
CVE-2017-17863 kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows



About   -   Send Feedback to @ubuntu_updates