Ukuhlaziya i-kernel ye-Linux ku-Ubuntu 20.10 kunye nazo zonke iinguqulelo ze-Ubuntu ezikhoyo ngoku, i-Canonical ikhuphe ingxelo ehlaziyiweyo yephakheji i-intel microcode ukujongana nobuthathaka bamva nje obufumaneka kwiimveliso ze-Intel. Kwaye baya ... Ngokuqinisekileyo sele ndilahlekile ukubala okoko iSpecter neMeltdown. Ukusukela ngoko, zininzi iingxaki zokhuseleko ezinxulunyaniswa nenkampani yaseSanta Clara.
Ukongeza kwi Umngcipheko I-CVE-2020-8694 sele ikhutshiwe kwii-Linux kernels zazo zonke iinguqulelo ze-Ubuntu, le phakheji intsha ye-Intel Microcode ikwanazo neepatches ze-microcode ezilungisa ezinye ezinje nge-CVE-2020-8695, CVE-2020-8696, kunye neCVE-2020 -8698 . Le yokugqibela inokuvumela uhlaselo lwasekhaya kwaye ichaze ulwazi olubuthathaka.
Kwimeko I-CVE-2020-8695, sesichengeni esafunyanwa nguAndreas Kogler, uCatherine Easdon, uClaudio Canella, uDaniel Grus, uDavid Oswald, uMichael Schwarz kunye noMoritz Lipp, kwi-RAPL (Intel Running Average Power Limit) ye-Intel microprocessors ethile. Kule meko ivumele uhlaselo lwecala elisecaleni ngokusekwe kwimilinganiselo yokusetyenziswa kwamandla.
Kwimeko I-CVE-2020-8696 kunye neCVE-2020-8698 zafunyanwa ngu-Ezra Caltum, uJoseph Nuzman, uNir Shildan, kunye no-Ofir Joseff kwezinye i-Intel microprocessors, ezibangela ukuba izixhobo ekwabelwana ngazo zahlulwe ngokungafanelekanga okanye ulwazi olubuthathaka lususwe ngaphambi kokugcinwa okanye ukuhanjiswa.
Canonical ikhawuleze ukukhupha ezi nguqulelo zintsha ze-Intel's microcode (Intel Microcode 3.20201110.0) kwi-Ubuntu 20.10, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, kunye ne-Ubuntu 14.04 ESM, kunye nazo zonke iincasa zazo. Nangona kusenokwenzeka ukuba zikhutshiwe kwi-Debian, SUSE, Red Hat, nakwezinye ii-distros ezihlala zifumana ii-patches zokhuseleko rhoqo.
Uyazi, ukuba une-chip ye-Intel echaphazelekayo kobu buthathaka, qiniseka ukuba hlaziya inkqubo ukukwazi ukukhuselwa kwezi mpazamo zokhuseleko ...
- Olunye ulwazi (fumana imeko yokuba sesichengeni, inkcazo, njl. Jonga iMeter CVE database