Package "linux-hwe-edge"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-hwe-edge


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

Latest version: *DELETED*
Release: xenial (16.04)
Level: base
Repository: main


Save this URL for the latest version of "linux-hwe-edge": https://www.ubuntuupdates.org/linux-hwe-edge

Other versions of "linux-hwe-edge" in Xenial

Repository Area Version
security main 4.15.0-23.25~16.04.1
updates main 4.15.0-23.25~16.04.1


Version: 4.13.0-23.27~16.04.1 2018-01-07 10:07:57 UTC

 linux-hwe-edge (4.13.0-23.27~16.04.1) xenial; urgency=low
   * linux-hwe-edge: 4.13.0-23.27~16.04.1 -proposed tracker (LP: #1741560)
   * linux: 4.13.0-23.27 -proposed tracker (LP: #1741556)
   [ Kleber Sacilotto de Souza ]
   * CVE-2017-5754
     - x86/mm: Add the 'nopcid' boot option to turn off PCID
     - x86/mm: Enable CR4.PCIDE on supported systems
     - x86/mm: Document how CR4.PCIDE restore works
     - x86/entry/64: Refactor IRQ stacks and make them NMI-safe
     - x86/entry/64: Initialize the top of the IRQ stack before switching stacks
     - x86/entry/64: Add unwind hint annotations
     - xen/x86: Remove SME feature in PV guests
     - x86/xen/64: Rearrange the SYSCALL entries
     - irq: Make the irqentry text section unconditional
     - x86/xen/64: Fix the reported SS and CS in SYSCALL
     - x86/paravirt/xen: Remove xen_patch()
     - x86/traps: Simplify pagefault tracing logic
     - x86/idt: Unify gate_struct handling for 32/64-bit kernels
     - x86/asm: Replace access to desc_struct:a/b fields
     - x86/xen: Get rid of paravirt op adjust_exception_frame
     - x86/paravirt: Remove no longer used paravirt functions
     - x86/entry: Fix idtentry unwind hint
     - x86/mm/64: Initialize CR4.PCIDE early
     - objtool: Add ORC unwind table generation
     - objtool, x86: Add facility for asm code to provide unwind hints
     - x86/unwind: Add the ORC unwinder
     - x86/kconfig: Consolidate unwinders into multiple choice selection
     - objtool: Upgrade libelf-devel warning to error for CONFIG_ORC_UNWINDER
     - x86/ldt/64: Refresh DS and ES when modify_ldt changes an entry
     - x86/mm: Give each mm TLB flush generation a unique ID
     - x86/mm: Track the TLB's tlb_gen and update the flushing algorithm
     - x86/mm: Rework lazy TLB mode and TLB freshness tracking
     - x86/mm: Implement PCID based optimization: try to preserve old TLB entries
       using PCID
     - x86/mm: Factor out CR3-building code
     - x86/mm/64: Stop using CR3.PCID == 0 in ASID-aware code
     - x86/mm: Flush more aggressively in lazy TLB mode
     - Revert "x86/mm: Stop calling leave_mm() in idle code"
     - kprobes/x86: Set up frame pointer in kprobe trampoline
     - x86/tracing: Introduce a static key for exception tracing
     - x86/boot: Add early cmdline parsing for options with arguments
     - mm, x86/mm: Fix performance regression in get_user_pages_fast()
     - x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
     - objtool: Don't report end of section error after an empty unwind hint
     - x86/head: Remove confusing comment
     - x86/head: Remove unused 'bad_address' code
     - x86/head: Fix head ELF function annotations
     - x86/boot: Annotate verify_cpu() as a callable function
     - x86/xen: Fix xen head ELF annotations
     - x86/xen: Add unwind hint annotations
     - x86/head: Add unwind hint annotations
     - ACPI / APEI: adjust a local variable type in ghes_ioremap_pfn_irq()
     - x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
     - x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state'
     - x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
     - x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
     - bitops: Add clear/set_bit32() to linux/bitops.h
     - x86/cpuid: Add generic table for CPUID dependencies
     - x86/fpu: Parse clearcpuid= as early XSAVE argument
     - x86/fpu: Make XSAVE check the base CPUID features before enabling
     - x86/fpu: Remove the explicit clearing of XSAVE dependent features
     - x86/platform/UV: Convert timers to use timer_setup()
     - objtool: Print top level commands on incorrect usage
     - x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
     - x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
     - mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
     - x86/kasan: Use the same shadow offset for 4- and 5-level paging
     - x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and
     - x86/xen: Drop 5-level paging support code from the XEN_PV code
     - ACPI / APEI: remove the unused dead-code for SEA/NMI notification type
     - x86/asm: Don't use the confusing '.ifeq' directive
     - x86/build: Beautify build log of syscall headers
     - x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to
     - x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
     - x86/mm: Relocate page fault error codes to traps.h
     - x86/boot: Relocate definition of the initial state of CR0
     - ptrace,x86: Make user_64bit_mode() available to 32-bit builds
     - x86/entry/64: Remove the restore_c_regs_and_iret label
     - x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
     - x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
     - x86/entry/64: Simplify reg restore code in the standard IRET paths
     - x86/entry/64: Shrink paranoid_exit_restore and make labels local
     - x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
     - x86/entry/64: Merge the fast and slow SYSRET paths
     - x86/entry/64: Use POP instead of MOV to restore regs on NMI return
     - x86/entry/64: Remove the RESTORE_..._REGS infrastructure
     - xen, x86/entry/64: Add xen NMI trap entry
     - x86/entry/64: De-Xen-ify our NMI code
     - x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of
     - x86/entry/64: Pass SP0 directly to load_sp0()
     - x86/entry: Add task_top_of_stack() to find the top of a task's stack
     - x86/xen/64, x86/entry/64: Clean up SP code in cpu_initialize_context()
     - x86/entry/64: Stop initializing TSS.sp0 at boot
     - x86/entry/64: Remove all remaining direct thread_struct::sp0 reads
     - x86/entry/32: Fix cpu_current_top_of_stack initialization at boot
     - x86/

1734147 Ubuntu 17.10 corrupting BIOS - many LENOVO laptops models
CVE-2017-5754 Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an at
CVE-2017-17862 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This beh
CVE-2017-17864 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data
CVE-2017-16995 The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corrupt
CVE-2017-17863 kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows

About   -   Send Feedback to @ubuntu_updates