Canonical releases Spectre/Meltdown patch for Ubuntu 17.10 and Raspberry Pi 2
Canonical released two security recommendations on Thursday, announcing Specter mitigation for the ARM64 (AArch64) hardware architecture on its Ubuntu 17.10 and Ubuntu 16.04.4 LTS systems.
On July 6, January this year, Canonical released several Kernel updates for Ubuntu 17.10 (Artful Aardvark) and other supported Ubuntu versions, and provided software mitigation measures for Spectre and Meltdown security vulnerabilities. These patches are first released for the 64-bit (amd64) architecture, and then for the 32-bit (i386), PPC64el, and s390x systems.
Today, the company announced the launch of a new kernel update to address the Meltdown and Spectre security vulnerabilities in ARM64 (AArch64) hardware architecture, patch Ubuntu 17.10's Raspberry Pi 2 kernel and its derived products.
"USNS 3541-1 and 3523-1 provide mitigation for Specter and Meltdown (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754,) for i386, amd64 and ppc64el architectures of Ubuntu 17.10. Corresponding arm64 architecture mitigation ". For more information, please read the new security suggestions.
Canonical urges the user to install the Linux-image-4.13.0-1015-raspi2-4.13.0-1015.16 kernel as soon as possible so that his linux-raspi2 kernel package can be patched for the Raspberry Pi 2 board computer on Ubuntu 17.10 systems and is now available from the main Ubuntu software repository.
We can see that today's update is also applicable to the Linux Hardware Enablement (HWE) kernel of Ubuntu 17.10, applicable to Ubuntu 16.04 LTS (Xenial Xerus) systems, but not Raspberry Pi 2. Ubuntu 17.10 LTS users running Ubuntu 16.04 kernel need to update their installation to linux-image-4.13.0-37-generic-4.13.0-37.42 ~ 16.04.1.
To update your system, follow the instructions provided by Canonical (the following command or the one mentioned in this article ). After the kernel is updated, you must restart your computer to correctly install and enable the new kernel version. Remember to always update your installation to ensure its security.
After logging on, you can check and apply new updates:
$ Sudo apt-get update
$ Sudo apt-get dist-upgrade
This article permanently updates link: https://www.bkjia.com/Linux/2018-03/151397.htm