[01:20] !kpti [01:20] Spectre and Meltdown are security issues that affect most processors, mitigated by a set of Linux kernel patches named KPTI. | General info: https://spectreattack.com/ | Ubuntu (and flavors) info: http://ubottu.com/y/ubukpti/ | An Ubuntu Security Notice will be released when updates are available, subscribe at https://usn.ubuntu.com/usn/ [01:20] !-kpti [01:20] kpti aliases: kaiser, spectre, meltdown - added by dax on 2018-01-03 21:09:51 - last edited by dax on 2018-01-05 00:58:01 [01:27] not sure this is gonna fit on one line [01:27] !no, meltdown is Meltdown is a security issue affecting (primarily) Intel processors. It is mitigated by Linux kernel patches named KPTI. Ubuntu released security updates for 14.04, 16.04, and 17.10 with these patches. 17.04 will not receive this update. 18.04 will ship with kernel 4.15, which is patched already. 16.04 has updates for Linux 4.4 (release) and 4.13 (HWE), installs with 4.10 should [01:27] I'll remember that dax [01:27] upgrade to 4.13. [01:27] lol [01:27] !no, meltdown is Meltdown is a security issue with (primarily) Intel processors. It's mitigated by kernel patches named KPTI. Ubuntu released them in security updates for 14.04, 16.04, and 17.10. 17.04 will not receive this update. 18.04 will ship with kernel 4.15, which is patched already. 16.04 has updates for Linux 4.4 (release) and 4.13 (HWE), installs with 4.10 should upgrade to 4.13. [01:27] I'll remember that dax [01:28] !no, kpti is meltdown [01:28] I'll remember that dax [01:28] !forget kaiser [01:28] I'll forget that, dax [01:28] !-spectre [01:28] spectre is kpti - added by dax on 2018-01-03 22:56:29 [01:30] !no, spectre is Spectre is a security issue in almost all modern processors, which was released along with !Meltdown (but is not the same thing). While there are several initiatives underway to mitigate it, there is no "magic bullet" software fix. Ubuntu is monitoring ongoing efforts and will provide security updates as they become available. See !usn for security update notifications. [01:30] I'll remember that dax [01:34] !nopti is KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, especially those without PCID support (output of "grep pcid /proc/cpuinfo" is empty), KPTI has a sigificant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub but should only be done if absolutely necessary. [01:34] I'll remember that, dax [01:34] !nopti =~ s/should/this should/ [01:34] I'll remember that dax [01:35] !meltdown =~ s/$/ See also !spectre, !nopti/ [01:35] I'll remember that dax [01:35] !meltdown [01:35] Meltdown is a security issue with (primarily) Intel processors. It's mitigated by kernel patches named KPTI. Ubuntu released them in security updates for 14.04, 16.04, and 17.10. 17.04 will not receive this update. 18.04 will ship with kernel 4.15, which is patched already. 16.04 has updates for Linux 4.4 (release) and 4.13 (HWE), installs with 4.10 should upgrade to 4.13. See also !spectre, !nopti [01:35] \o/ [01:40] !nopti =~ s/sigificant/significant/ [01:40] I'll remember that dax [01:54] !nopti =~ s/especially those without PCID support (output of "grep pcid /proc/cpuinfo" is empty), // [01:54] Too many (or not enough) delimiters [01:54] !nopti =~ s#especially those without PCID support (output of "grep pcid /proc/cpuinfo" is empty), ## [01:54] Nothing changed there [01:54] !nopti [01:54] KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, especially those without PCID support (output of "grep pcid /proc/cpuinfo" is empty), KPTI has a significant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub but this should only be done if absolutely necessary. [01:54] !nopti =~ s^especially those without PCID support (output of "grep pcid /proc/cpuinfo" is empty), ^^ [01:54] Nothing changed there [01:54] hrm [01:55] !no, nopti is KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, KPTI has a significant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub but this should only be done if absolutely necessary. [01:55] I'll remember that dax [02:04] !nopti =~ s/.$/ because it will disable proctections against Meltdown./ [02:04] I'll remember that dax [02:05] !nopti =~ s/.$/ and thus allows any malicious user process to read memory and probably escalate to root./ [02:05] I'll remember that dax [02:05] !nopti [02:05] KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, KPTI has a significant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub but this should only be done if absolutely necessary because it will disable proctections against Meltdown and thus allows any malicious user process to read memory and probably escalate to root. [02:06] !nopti =~ s/ but this/. This/ [02:06] I'll remember that dax [02:06] !nopti [02:06] KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, KPTI has a significant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub. This should only be done if absolutely necessary because it will disable proctections against Meltdown and thus allows any malicious user process to read memory and probably escalate to root. [02:06] !nopti =~ s/allows/allow/ [02:06] I'll remember that dax [02:06] (sorry for all the noise) [02:06] !nopti [02:06] KPTI is a mitigation for the !Meltdown security issue. With some workloads on some processors, KPTI has a significant performance impact. KPTI can be disabled by adding "nopti" to the GRUB_CMDLINE_LINUX_DEFAULT line in /etc/default/grub. This should only be done if absolutely necessary because it will disable proctections against Meltdown and thus allow any malicious user process to read memory and probably escalate to root. [02:07] !nopti =~ s/proctections/protections/ [02:07] I'll remember that dax [02:37] oh hell, let's do another topic while we're at it [02:38] !search lenovo [02:38] Found: [02:40] !lenovobug is Current Ubuntu 17.10 ISOs contain a bug that makes firmware memory read-only. The bug description on https://pad.lv/1734147 contains more information and fixes for users affected by this issue. The kernel in the 17.10 repositories has been updated and will not trigger this bug, so upgrading is now safe. Ubuntu 17.10 ISOs will be re-released on January 11th with updated, safe, [02:40] packages. [02:40] Launchpad bug 1734147 in linux (Ubuntu Artful) "corrupted BIOS due to Intel SPI bug in kernel" [Critical,Fix released] [02:40] I'll remember that, dax [02:40] dangit [02:41] !no, lenovobug is Current Ubuntu 17.10 ISOs contain a bug that makes firmware memory read-only. https://pad.lv/1734147 contains more information and fixes for users affected by this issue. The kernel in the 17.10 repositories has been updated and will not trigger this bug, so upgrading is now safe. Ubuntu 17.10 ISOs will be re-released on January 11th with updated, safe, packages. [02:41] I'll remember that dax [02:41] !artfulrespin is lenovobug [02:41] I'll remember that, dax [02:41] !intel-spi is lenovobug [02:41] I'll remember that, dax [02:41] !intelspi is lenovobug [02:41] I'll remember that, dax [02:41] better late than never. [02:43] dax: the current 17.10 ISOs are fixed, see http://iso.qa.ubuntu.com/qatracker/milestones/385/builds and http://cdimage.ubuntu.com/artful/daily-live/pending/ [02:43] those aren't "the current 17.10 ISOs" until Thursday [02:43] and yes, I'm aware of the testing ISOs :) [02:48] hrm, i swear i saw somewhere on LP saying upgrades were safe, but now that i'm double-checking i can't find it [02:49] "We have not done this because the kernel you get with a dist-upgrade is /fixed/ to no longer trigger this issue." yay ok good [02:50] the kernels without SPI_INTEL_SPI_PLATFORM being published, you mean? [02:50] ah, right [02:50] https://launchpad.net/ubuntu/+source/linux/4.13.0-21.24 [02:50] thanks JackFrost, meltdown crapped all over the publishing history and i'm too tired to find it from there [02:50] Indeed. [03:48] morning guys, could anyone reload ubottu for right kernels on the kpti its happening on !usn [03:49] tnx [12:01] hey TJ- [12:13] hallo. Oh, it auto-reconnected after last night! === JackFrost is now known as Unit193