this post was submitted on 12 Nov 2024
119 points (99.2% liked)

Linux

48364 readers
1314 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
top 22 comments
sorted by: hot top controversial new old
[–] GolfNovemberUniform@lemmy.ml 27 points 2 weeks ago (4 children)

The real thing is: can you update the microcode of older CPUs? If not then it's a marketing strategy.

[–] undefined@lemmy.hogru.ch 23 points 2 weeks ago* (last edited 2 weeks ago)

I mean, it’s still good to know if you’re vulnerable right (for sake of discussion)?

[–] stuner@lemmy.world 17 points 2 weeks ago

It sounds like the criterion is "is newer microcode available". So it doesn't look like a marketing strategy to sell new CPUs.

[–] nanook@friendica.eskimo.com 11 points 2 weeks ago

@GolfNovemberUniform @captainkangaroo Yes and Linux includes software to do this.

[–] IrritableOcelot@beehaw.org 7 points 2 weeks ago

The article does specify that it would report if the newest version of the firmware for the CPU family is not installed, so it doesn't seem like this is that particular kind of BS.

[–] nanook@friendica.eskimo.com 18 points 2 weeks ago

Microcode would not be a concern with that particular CPU.

[–] electricprism@lemmy.ml 12 points 2 weeks ago (1 children)

How about a Linux Patch that reports binary blobs wirh no source AS __ Security Vulnerabilities __

Or are we not allowed to criticize the back doors that hackers gain access to.

[–] mypasswordis1234@lemmy.world 1 points 1 week ago (1 children)

Your brain isn't open source. You're a security vulnerability

[–] electricprism@lemmy.ml 1 points 1 week ago

Don't let your dreams be dreams.

[–] ryannathans@aussie.zone 5 points 2 weeks ago (1 children)

How does it know if the microcode is outdated?

[–] nanook@friendica.eskimo.com 15 points 2 weeks ago (3 children)

@ryannathans @captainkangaroo I'm going to make the wild assumption that the kernel will have a table of the current microcode versions at the time of it's release, but I doubt that
will get updated except by kernel upgrades.

[–] DaPorkchop_@lemmy.ml 3 points 2 weeks ago (1 children)

Debian-based distros (and probably most othera as well) actually have a package called "intel-microcode" which gets updated fairly regularly.

[–] nanook@friendica.eskimo.com 1 points 2 weeks ago

@DaPorkchop_ Oddly, if you build your own kernel and remove the system provided one, the package gets automatically removed as well which is weird, because it is really still needed regardless.

[–] Strit@lemmy.linuxuserspace.show 3 points 2 weeks ago

There's probably an efivar that reads the current microcode version.

[–] ryannathans@aussie.zone 1 points 2 weeks ago (1 children)

If that's the case, why wouldn't they put the microcode in the kernel?

[–] nanook@friendica.eskimo.com 1 points 2 weeks ago (1 children)

@ryannathans Why bloat the kernel with the microcode for every intel processor that might need it (and there is a similar thing for AMD) when you don't have that specific processor? It does make more sense for it to be a separate, especially on memory constrained systems. I mean if you've got 256GB of RAM probably not a big deal but if you've got 256MB a big deal.

[–] ryannathans@aussie.zone 1 points 2 weeks ago* (last edited 2 weeks ago)

The kernel compilation is already configurable between megabytes and gigabyte+

Distros pick their featureset

[–] ouch@lemmy.world 2 points 2 weeks ago (3 children)

The Linux kernel would maintain a list of the latest Intel microcode versions for each CPU family, which is based on the data from the Intel microcode GitHub repository. In turn this list would need to be kept updated with new Linux kernel releases and as Intel pushes out new CPU microcode files.

Sounds like that would be outdated for everyone without a rolling distro.

[–] Atemu@lemmy.ml 11 points 2 weeks ago

Stable distros can and will backport security fixes. Good ones that is.

[–] trolololol@lemmy.world 3 points 1 week ago* (last edited 1 week ago)

Sounds like a user space application, there's no place for this in the kernel. So would you need to upgrade kennel and reboot to update the list? Nonsense.

[–] AndrewZabar@lemmy.world 2 points 1 week ago

Yeah, methinks this will be one of those alerts pretty much everyone will be like "yeah, yeah, I know" and click to silence those notifications.

[–] mvirts@lemmy.world 1 points 2 weeks ago

So the patch is just copying the existing warning to a standard location?