Page 2 of 21 FirstFirst 123412 ... LastLast
Results 11 to 20 of 209

Thread: Meltdown and Spectre Discussion Sticky

  1. #11
    Join Date
    Sep 2013
    Beans
    55

    Meltdown and Spectre Discussion Sticky

    Do Meltdown and Spectre vulnerability problems only apply to 64 bit processors ?

    Thanks.
    Last edited by QIII; January 5th, 2018 at 10:06 PM.

  2. #12
    Join Date
    Jun 2006
    Location
    UK
    Beans
    Hidden!
    Distro
    Ubuntu 18.04 Bionic Beaver

    Meltdown and Spectre Discussion Sticky

    Thread moved to Security.

    "Hardware" is for help getting hardware to work with Ubuntu.
    Last edited by QIII; January 5th, 2018 at 10:07 PM.
    Ubuntu 16.04 Desktop Guide - Ubuntu 18.04 Desktop Guide - Forum Guide to BBCode - Using BBCode code tags - IRC #ubuntuforums

    Member: Not Canonical Team

    Please do not PM me about your forum account unless you have been asked to. The correct place to contact an admin about your account is here.

  3. #13
    Join Date
    Feb 2010
    Location
    Summerwind
    Beans
    13,677
    Distro
    Ubuntu Budgie Development Release

    Meltdown and Spectre Discussion Sticky

    I find a few posts about this . There will probably be more info in the coming days. Most intel chips since 1995 use speculative execution.

    https://security.stackexchange.com/q.../176739#176739



    Any CPU that performs speculative execution is vulnerable to Spectre, so yes, 32-bit OSs are vulnerable.

    Meltdown is an issue with how Intel CPUs enforce memory protection while performing speculative execution (in short, memory protection isn't enforced until the point at which speculative execution is turned into real execution). 32-bit OSs on Intel CPUs are vulnerable, but the heavier use of swap reduces the impact somewhat (Meltdown can only read physical memory; data that's been swapped out to disk is inaccessible).
    Last edited by QIII; January 5th, 2018 at 10:07 PM. Reason: Add Info
    “Start where you are. Use what you have. Do what you can".

    Ubuntu Documentation Search: Popular Pages
    Ubuntu: Security Basics
    Ubuntu: Flavors

  4. #14
    Join Date
    Aug 2006
    Beans
    13,015
    Distro
    Ubuntu Mate 18.04 Bionic Beaver

    Re: Is Ubuntu really going to leave 32-bit users in the dust with Meltdown and Spectr

    This is a partial quote that looks much like FUD. The original one looks like this:
    http://blog.dustinkirkland.com/2018/...n-spectre.html
    Ubuntu users of the 64-bit x86 architecture (aka, amd64) can expect updated kernels by the original January 9, 2018 coordinated release date, and sooner if possible.
    Presumably, 32bit kernels will get updates at a later date, when patches are available.

    PS: In case you can't wait, there is mainline kernel 4.14.12 from the PPA with KPTI enabled. It's available, among others, for i386 architecture.
    http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.14.12/
    Last edited by mikewhatever; January 5th, 2018 at 08:07 PM.

  5. #15
    Join Date
    Oct 2009
    Location
    Reykjavík, Ísland
    Beans
    12,979
    Distro
    Lubuntu 18.04 Bionic Beaver

    Re: Is Ubuntu really going to leave 32-bit users in the dust with Meltdown and Spectr

    It has never happened before that a supported release does not receive security updates. This is the definition of support.

    My guess is that they are working under time pressure and must release the fix coordinated with other operative systems. Because of this the 64 bit task is first in priority.

    (Ninja'ed by Mike)

  6. #16
    Join Date
    Jul 2008
    Location
    The Left Coast of the USA
    Beans
    Hidden!
    Distro
    Kubuntu

    Late to the party ...

    I read an article posted by another user (mikewhatever posted it above as well) that indicated both Microsoft and Linux OSes expect to have official patched and packaged kernels on Tuesday, 9 January. I know that there is already a patched Linux kernel available (and another RC) if one wants to apply it.
    Last edited by QIII; January 5th, 2018 at 08:28 PM.
    Please read The Forum Rules and The Forum Posting Guidelines
    My Blog
    A thing discovered and kept to oneself must be discovered time and again by others. A thing discovered and shared with others need be discovered only the once.
    This universe is crazy. I'm going back to my own.

  7. #17
    Join Date
    Dec 2017
    Beans
    68

    new memory problem on Intel chips and Linux

    What do you do to protect your pc against this memory problem on INtel chips?? 14.04

  8. #18
    Join Date
    Jun 2009
    Location
    0:0:0:0:0:0:0:1
    Beans
    4,915
    Distro
    Xubuntu

    Re: new memory problem on Intel chips and Linux

    Quote Originally Posted by j3984 View Post
    What do you do to protect your pc against this memory problem on INtel chips?? 14.04
    aside from the normal things like do not run untrusted software on your system i have read this can the exploited via javascript, so i would suggest using noscript to minimize the threat until the patches are out or compile your own kerenl

    from all the benchmarks i have seen at phonorix the performance impact is 0 to 2%, affecting wine, and very high I/O operations eg: SQL benchmark
    Laptop: ASUS A54C-NB91 (Storage: WD3200BEKT + MKNSSDCR60GB-DX); Desktop: Custom Build - Images included; rPi Server
    Putting your Networked Printer's scanner software to shame PHP Scanner Server
    I frequently edit my post when I have the last post

  9. #19
    Join Date
    Feb 2010
    Location
    Summerwind
    Beans
    13,677
    Distro
    Ubuntu Budgie Development Release

    Re: Meltdown and Spectre Discussion Sticky

    Relevant to Firefox users and I suspect other browsers are doing the same.

    https://www.mozilla.org/en-US/firefo.../releasenotes/
    “Start where you are. Use what you have. Do what you can".

    Ubuntu Documentation Search: Popular Pages
    Ubuntu: Security Basics
    Ubuntu: Flavors

  10. #20
    Join Date
    Aug 2015
    Beans
    428

    Re: Meltdown and Spectre Discussion Sticky

    Once the kernel update is done, is there a way to test if my computer is still vulnerable?

    Thanks.

Page 2 of 21 FirstFirst 123412 ... LastLast

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •