Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Ubuntu anouncement on Spectre/Meltdown (ubuntu.com)
93 points by theptip on Jan 4, 2018 | hide | past | favorite | 15 comments


One interesting piece of information from this post is that Intel notified Ubuntu about the issue on November 9. Project Zero notified Intel on June 1, so it took over 5 months before they passed it on to Ubuntu (and even longer for the other vendors).

That seems like an extremely long time to me, when it (I assume) was pretty obvious that it was going to require OS changes to mitigate.


Why would Ubuntu need to be notified? Fixes for this are going to be at the Linux Kernel level or (at most) Debian upstream. Canonical shouldn't need to do anything?


If some fixes can be applied via microcode, then the distros will have to be provided the updated microcode. The kernel (mostly) does not handle CPU microcode distribution.


Ubuntu kernel don't rely on Debian. Have you seen how Debian lags behind the rest in terms of versions.


Lags behind? Linux kernel version 4.14 is available for Debian Stretch:

https://packages.debian.org/stretch-backports/linux-image-am...


Ubuntu certainly used to rely on Debian. When did it change?


Pretty sure Ubuntu are the largest Linux vendor right now, and have their distro on the largest number of servers worldwide.


From TFA

>To address the issue, updates to the Ubuntu kernel and processor microcode will be needed. These updates will be announced in future Ubuntu Security Notices once they are available.


So, basically Intel kept this stuff to themselves from June through November?


> The original coordinated disclosure date was planned for January 9 and we have been driving toward that date to release fixes. Due to the early disclosure, we are trying to accelerate the release, but we don't yet have an earlier ETA when the updates will be released.


What happened that the disclosure was too early?


People started figuring out some details about the vulnerability from various public sources (Linux kernel development, previously published security research), and it was getting a lot of media/internet attention.

The Google blog post from yesterday (https://security.googleblog.com/2018/01/todays-cpu-vulnerabi...) says:

> We are posting before an originally coordinated disclosure date of January 9, 2018 because of existing public reports and growing speculation in the press and security research community about the issue, which raises the risk of exploitation.


Given that the CRD/NDA came from Intel and that spectreattack.com is hosted by the University of Graz, I'd assume that that was a one-sided CRD.



Truly disappointing they are behind on this. This should be lighting a fire under all tech leaders.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: