Meltdown Updates Ruined Several Ubuntu Systems

Canonical was enforced to announce an additional round of Ubuntu updates that describe the freshly revealed CPU vulnerabilities after few users criticized that their systems no longer struck after installing the primary fixes. The Canonical announced Ubuntu updates designed to moderate Spectre and Meltdown on January 9, two newly revealed threat techniques that effort against processors from Intel, AMD, ARM, Qualcomm and IBM. The Linux kernel updates moderate the susceptibilities that permit the Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715) attacks.

Soon after the kernel was made updated to version 4.4.0-108, some Ubuntu users launched complains that their systems are unable to boot. So, the system was restored to the former version deceptively fixed the problem. Microsoft released the updates in response to the CPU errors also sourced complications, but only for users with older versions AMD processors. The company has chosen to deliver no more updates to AMD devices till compatibility errors are resolved for good. However, in the case of Ubuntu the update has marked the users with Intel processors.

Official has authorized that the patch for the Meltdown vulnerability presented a reversion that disallowed systems from restarting effectively. The issue has been stated with the announcement of new updates that carried out as version 4.4.0.109 of the kernel. All the affected users have confirmed that they have successfully started their systems after new updates to 4.4.0-109. While it’s uncertain to find out the devices that have been affected, Officials’ advisories indicated “a few systems.”

The affected technology firms announced the accessibility of fixes and workarounds for the Spectre and Meltdown susceptibilities soon after the errors were revealed by researchers. The most recent companies to announce the improvements are IBM, whose POWER processors and Power Systems servers are influenced, and NVIDIA, which issued updates for GPU exhibit drivers and related products to support moderate the CPU releases.

Meltdown and Spectre permit hostile applications to avoid memory remoteness mechanisms and acquire passwords, photos, documents, emails, and other complex evidence. Fixes for the concealed susceptibilities may present noteworthy performance consequences.

 

Leave a Reply

Your email address will not be published. Required fields are marked *