Quaisquer perguntas relacionadas a atualizações de status ou se alguma coisa será corrigida para essas vulnerabilidades devem ser encerradas como duplicatas desta pergunta.
Meltdown e Spectre estão no noticiário agora e soam bastante severos. Não vejo nenhuma atualização de segurança do Ubuntu que cubra essas vulnerabilidades.
O que o Ubuntu está fazendo sobre essas vulnerabilidades e o que os usuários do Ubuntu devem fazer?
Estes são CVE-2017-5753, CVE-2017-5715 e CVE-2017-5754.
Foi descoberto que uma nova classe de ataques de canal lateral afeta a maioria dos processadores, incluindo processadores da Intel, AMD e ARM. O ataque permite que processos maliciosos do espaço do usuário leiam a memória do kernel e códigos maliciosos nos convidados leiam a memória do hipervisor.
Para resolver o problema, são necessárias atualizações no kernel do Ubuntu e no microcódigo do processador. As atualizações são anunciadas nos Avisos de Segurança do Ubuntu . Atualizações relacionadas ao Meltdown/Spectre já foram anunciadas, abrangendo atualizações para o kernel e para alguns softwares de espaço de usuário.
As seguintes atualizações foram lançadas:
USN-3531-1 fornece atualizações de microcódigo Intel.Devido a regressões, as atualizações do microcódigo foram revertidas por enquanto ( USN-3531-2 ).Os usuários devem instalar imediatamente as atualizações assim que forem lançadas da maneira normal . Uma reinicialização é necessária para que as atualizações do kernel e do microcódigo entrem em vigor.
Os usuários podem verificar se os patches de isolamento da tabela de páginas do kernel estão ativos após a reinicialização.
Atualizações para o Ubuntu 17.04 (Zesty Zapus) não serão fornecidas , pois chegou ao fim de sua vida útil em 13 de janeiro de 2018.
Antes do lançamento das atualizações de segurança, Dustin Kirkland forneceu mais alguns detalhes sobre quais atualizações esperar em uma postagem no blog , incluindo a menção de atualizações do kernel, bem como atualizações de microcódigo da CPU, gcc e qemu.
Kiko Reis da Canonical escreveu uma descrição acessível do impacto dessas vulnerabilidades e suas mitigações para usuários do Ubuntu em 24 de janeiro de 2018.
A equipe de segurança do Ubuntu está mantendo seu status atual sobre esses problemas e um FAQ técnico oficial que detalha as variantes de vulnerabilidade individuais específicas e suas mitigações em diferentes casos de uso.
Observe que as atualizações de versão principal e estável do Linux a partir da versão 4.15 (28 de janeiro de 2018) incluem as correções apropriadas e os kernels do Ubuntu são baseados nelas. Como tal, todas as versões do Ubuntu usando o Linux Kernel versões 4.15.0 e superiores são corrigidas (incluindo 18.04 e 18.10).
There's specific things to keep in mind here, and this is picked up from some of the analysis and security mailing lists I'm on that go beyond just Ubuntu:
The Meltdown attack is able to be patched at a kernel level. This will help to protect against the Meltdown set of vulnerabilities.
The Spectre attack vector is much harder to protect against, but is also much harder for the bad guys to exploit. While there are software patches for known attack vectors, such as an LLVM attack vector which can be patched, the core problem is that to really fix Spectre you have to alter how CPU hardware works and behaves. This makes it much MUCH harder to protect against, because only known attack vectors can really be patched. Every piece of software needs individual hardening for this issue, though, which means that it's one of those "one patch does not fix all" kind of deals.
Now, for the big questions:
When will fixes be available?
I'll give you the same answer I got from the Kernel team: "When we're confident the patches work and that we don't break anything else majorly along the way."
Now, a big thing to consider: There was a targeted date for a public disclosure of January 9th, that was supposed to coincide with a release of fixes. However, disclosure happened on the 3rd of January, instead. The kernel team and Security Team are still targeting the January 9th date, however this is not a firm deadline, and there could be delays if anything major to the kernels breaks in the process
Is there someplace I should be looking for more updates on Meltdown and Spectre?
Yes, actually. The Ubuntu Security team has a knowledge base article on Spectre and Meltdown, and that is where you'll notice some status reports about the timeline for fixes being released and what not.
You should also watch the Ubuntu Security Team's Security Notifications site, and keep an eye out for the announcement of fixes being made available to the kernels.
Other relevant links you should keep an eye on:
20 de janeiro de 2018
A proteção Specter ( Retpoline ) foi lançada para Kernel 4.9.77 e 4.14.14 pela equipe Linux Kernel em 15 de janeiro de 2018. A equipe Ubuntu Kernel lançou apenas a versão 4.9.77 do kernel em 17 de janeiro de 2018 e não publicou a versão 4.14 do kernel .14. O motivo não está claro, mas o 4.14.14 foi solicitado novamente, conforme respondido em Ask Ubuntu: Por que o kernel 4.9.77 foi lançado, mas não o kernel 4.14.14? e não apareceu até hoje.
17 de janeiro de 2018 Adicionando suporte Spectre ao Meltdown
Eu pensei que alguns estariam interessados nas mudanças em 4.14.14 (de 4.14.13) conforme documentado nos comentários dos programadores que eu acho que são bastante detalhados para programadores de kernel C devido à minha exposição limitada. Aqui estão as mudanças do kernel 4.14.13 para 4.14.14 focando principalmente no suporte Spectre :
If you have any questions about the programmers' documentation post a comment below and I'll try my best to answer.
January 16, 2018 update Spectre in 4.14.14 and 4.9.77
If you are already running Kernel versions 4.14.13 or 4.9.76 like I am it's a no-brainer to install
4.14.14
and4.9.77
when they come out in a couple of days to mitigate the Spectre security hole. The name of this fix is Retpoline which doesn't have the severe performance hit previously speculated:January 12, 2018 update
Initial protection from Spectre is here and will be improved in weeks and months to come.
Linux Kernels 4.14.13, 4.9.76 LTS, and 4.4.111 LTS
From this Softpedia article:
Many users had problems with Ubuntu LTS updates on January 4, 2018 and January 10, 2018. I've been using
4.14.13
for a couple of days without any problems however YMMV. Skip to the bottom for instructions on installing Kernel 14.14.13.January 7, 2018 update
Greg Kroah-Hartman wrote a status update on the Meltdown and Spectre Linux Kernel security holes yesterday. Some may call him the second most powerful man in the Linux world right next to Linus. The article addresses stable kernels (discussed below) and LTS kernels which the majority of Ubuntu uses.
Not recommended for average Ubuntu User
This method involves manually installing the latest mainline (stable) kernel and is not recommended for the average Ubuntu user. The reason being after you manually install a stable kernel it stays there until you manually install a newer (or older) one. Average Ubuntu users are on the LTS branch which will install a new kernel automatically.
As others have mentioned, it is simpler to wait for the Ubuntu Kernel Team to push out updates through the regular process.
This answer is for advanced Ubuntu users who want the "Meltdown" security whole fixed right away and are willing to do extra manual work.
Linux Kernels 4.14.11, 4.9.74, 4.4.109, 3.16.52, and 3.2.97 Patch Meltdown Flaw
From this article:
Users are urged to update their systems immediately
Jan 4, 2018 01:42 GMT · By Marius Nestor
Linux kernel maintainers Greg Kroah-Hartman and Ben Hutchings have released new versions of the Linux 4.14, 4.9, 4.4, 3.16, 3.18, and 3.12 LTS (Long Term Support) kernel series that apparently patch one of the two critical security flaws affecting most modern processors.
The Linux 4.14.11, 4.9.74, 4.4.109, 3.16.52, 3.18.91, and 3.2.97 kernels are now available to download from the kernel.org website, and users are urged to update their GNU/Linux distributions to these new versions if they run any of those kernel series immediately. Why update? Because they apparently patch a critical vulnerability called Meltdown.
As reported earlier, Meltdown and Spectre are two exploits that affect nearly all devices powered by modern processors (CPUs) released in the past 25 years. Yes, that means almost all mobile phones and personal computers. Meltdown can be exploited by an unprivileged attacker to maliciously obtain sensitive information stored in kernel memory.
Patch for Spectre vulnerability still in the works
While Meltdown is a serious vulnerability which can expose your secret data, including passwords and encryption keys, Spectre is even worse, and it's not easy to fix. Security researchers say it will haunt us for quite some time. Spectre is known to exploit the speculative execution technique used by modern CPUs to optimize performance.
Until the Spectre bug is patched too, it is strongly recommended that you at least update your GNU/Linux distributions to any of the newly released Linux kernel versions. So search the software repositories of your favorite distro for the new kernel update and install it as soon as possible. Don't wait until it's too late, do it now!
I had been using Kernel 4.14.10 for a week so downloading and booting Ubuntu Mainline Kernel version 4.14.11 wasn't too much of a concern for me.
Ubuntu 16.04 users might be more comfortable with 4.4.109 or 4.9.74 kernel versions which were released at the same time as 4.14.11.
If your regular updates do not install the Kernel version you desire you can do it manually following this Ask Ubuntu answer: How do I update kernel to the latest mainline version?
4.14.12 - What a difference a day makes
Less than 24 hours after my initial answer a patch was released to fix 4.14.11 kernel version that they may have rushed out. Upgrading to 4.14.12 is recommended for all 4.14.11 users. Greg-KH says:
Looking at this update not very many lines of source code were changed.
Kernel 4.14.13 Installation
More Meltdown revisions and beginning of Spectre features were introduced in Linux Kernels 4.14.13, 4.9.76 and 4.4.111.
There are reasons why you want to install the latest mainline kernel:
As of January 15, 2018 the latest stable mainline kernel is
4.14.13
. If you choose to manually install it you should know:sudo apt auto-remove
command. You need to follow this: How do I remove old kernel versions to clean up the boot menu?sudo update-grub
and then Ubuntu's latest LTS kernel will be the first option called Ubuntu on Grub's main menu.Now that the warning are out of the way, to install the latest mainline kernel (4.14.13) follow this link: How to update kernel to the latest mainline version without any Distro-upgrade?