• stuner@lemmy.world
      link
      fedilink
      arrow-up
      17
      ·
      6 days ago

      It sounds like the criterion is “is newer microcode available”. So it doesn’t look like a marketing strategy to sell new CPUs.

    • IrritableOcelot@beehaw.org
      link
      fedilink
      arrow-up
      7
      ·
      6 days ago

      The article does specify that it would report if the newest version of the firmware for the CPU family is not installed, so it doesn’t seem like this is that particular kind of BS.

  • electricprism@lemmy.ml
    link
    fedilink
    arrow-up
    14
    arrow-down
    2
    ·
    6 days ago

    How about a Linux Patch that reports binary blobs wirh no source AS __ Security Vulnerabilities __

    Or are we not allowed to criticize the back doors that hackers gain access to.

  • ouch@lemmy.world
    link
    fedilink
    arrow-up
    5
    arrow-down
    3
    ·
    6 days ago

    The Linux kernel would maintain a list of the latest Intel microcode versions for each CPU family, which is based on the data from the Intel microcode GitHub repository. In turn this list would need to be kept updated with new Linux kernel releases and as Intel pushes out new CPU microcode files.

    Sounds like that would be outdated for everyone without a rolling distro.

    • Atemu@lemmy.ml
      link
      fedilink
      arrow-up
      11
      ·
      6 days ago

      Stable distros can and will backport security fixes. Good ones that is.

    • trolololol@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      5 days ago

      Sounds like a user space application, there’s no place for this in the kernel. So would you need to upgrade kennel and reboot to update the list? Nonsense.

    • AndrewZabar@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 days ago

      Yeah, methinks this will be one of those alerts pretty much everyone will be like “yeah, yeah, I know” and click to silence those notifications.