MeltdownºÍSpectreÎó²îÇ徲ͨ¸æ¼°²¹¶¡´óÈ«

Ðû²¼Ê±¼ä 2018-01-09
¿ËÈÕ£¬£¬£¬GoogleµÄProject ZeroÍŶӽÒÏþÐÂÎųÆ£¬£¬£¬ËûÃÇ·¢Ã÷ÁËMeltdown£¨ÈÛ¶Ï£¬£¬£¬CVE-2017-5754£©ºÍSpectre£¨ÓÄÁ飬£¬£¬CVE-2017-5753/CVE-2017-5715£©Á½¸öCPU¼¶±ðµÄÎó²î ¡£¡£¡£Ïà¹ØÎó²îʹÓÃÁËоƬӲ¼þ²ãÃæÖ´ÐмÓËÙ»úÖÆµÄÉè¼ÆÈ±ÏÝʵÏÖ²àÐŵÀ¹¥»÷£¬£¬£¬¿ÉÒÔ¼ä½Óͨ¹ýCPU»º´æ¶ÁȡϵͳÄÚ´æÊý¾Ý ¡£¡£¡£´Ë´Î±»ÆØ¹âµÄÎó²î²¨¼°¹æÄ£¹ã£¬£¬£¬ÏÕЩȫÇòËùÓеÄÅÌËã×°±¸¶¼ÊÜÓ°Ï죬£¬£¬ÒѾ­ÒýÆðÌìϹæÄ£ÄÚµÄÆÕ±é¹Ø×¢ ¡£¡£¡£ËäȻĿ½ñÉÐδÓÐʹÓÃÕâÁ½¸öÎó²î¾ÙÐй¥»÷µÄÊÂÎñת´ï£¬£¬£¬ÄϹ¬NGÓéÀÖÌì¾µÎó²îÑо¿ÍŶÓÌáÐÑ¿í´ó¿Í»§·À»¼ÓÚδȻ£¬£¬£¬ÊµÊ±ÐÞ²¹Îó²î ¡£¡£¡£


MeltdownÎó²îÓ°ÏìÏÕЩËùÓеÄIntel CPUºÍ²¿·ÖARM CPU£¬£¬£¬¶øSpectreÔòÓ°ÏìËùÓеÄIntel CPUºÍAMD CPU£¬£¬£¬ÒÔ¼°Ö÷Á÷µÄARM CPU ¡£¡£¡£Á½×éÎó²îÓ°ÏìµÄ²Ù×÷ϵͳº­¸ÇÏÖÔÚÏÕЩËùÓÐÅÌËã×°±¸ ¡£¡£¡£°üÀ¨Windows£¬£¬£¬Android£¬£¬£¬MacOS £¬£¬£¬IOS£¬£¬£¬Linux£¨Red hat/Debian/Ubuntu/Suse£©µÈ ¡£¡£¡£ÎªÁËÇå¾²Æð¼û£¬£¬£¬ÊÐÃæÉÏËùÓеÄЧÀÍÆ÷¡¢Ð¡ÎÒ˽¼ÒµçÄÔ¡¢ÊÖ»úµÈ¶¼ÐèÒªÉý¼¶Ó¦¶Ô ¡£¡£¡£µ«Í¬Ê±Ò²Òª¿´µ½Õâ¸öÎó²îʹÓÃÓÐÒ»¶¨µÄÃż÷£¬£¬£¬×ÝȻʹÓÃÀֳɣ¬£¬£¬Ò²Ö»ÄÜÈù¥»÷ÕßÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬²»¿ÉÌáȨºÍ¿ØÖÆÖ÷»ú ¡£¡£¡£ÓÄÁéÎó²î¶Ô¶à×⻧ϵÄÔÆÐ§ÀÍϵͳӰÏì½ÏÁ¿´ó£¬£¬£¬¹¥»÷ÕßÔÚÔÆÆ½Ì¨Í¨¹ýÍâµØµÄͨË׵Ļá¼ûȨÏ޾ͿÉÒÔ¶ÁÈ¡ÔÆÆ½Ì¨µÄÃô¸ÐÐÅÏ¢£¬£¬£¬Îª½øÒ»²½»ñµÃ¸ü¸ßµÄȨÏ޺ͻñµÃÉñÃØÊý¾ÝÌṩÁË¿ÉÄÜ ¡£¡£¡£ÁíÍâ˼Á¿µ½Éý¼¶ÁËCPUºÍ²Ù×÷ϵͳ֮ºóÅãͬµÄÐÔÄÜϽµ£¬£¬£¬²î±ðÓû§¿ÉÒÔÆÀ¹À×Ô¼ºµÄÇéÐÎÀ´×ö³ö¾öÒé ¡£¡£¡£½¨ÒéСÎÒ˽¼ÒÓû§Ö÷ÒªÉý¼¶²Ù×÷ϵͳ²¹¶¡¼°ä¯ÀÀÆ÷°æ±¾ ¡£¡£¡£


Õë¶ÔÕâÁ½×éÎó²î£¬£¬£¬¸÷¼ÒоƬ³§ÉÌ£¬£¬£¬²Ù×÷ϵͳ³§ÉÌ£¬£¬£¬ä¯ÀÀÆ÷³§ÉÌ£¬£¬£¬ÒÔ¼°ÔÆÐ§Àͳ§ÉÌ£¬£¬£¬¶¼Æð¾¢½ÓÄɲ½·¥£¬£¬£¬Ðû²¼Ç徲ͨ¸æ£¬£¬£¬²¢ÊµÊ±ÍƳö»º½â²½·¥ºÍÐÞ¸´²¹¶¡ ¡£¡£¡£¼øÓÚ´ËÁ½×éÎó²îÓ°ÏìÃæÖØ´ó£¬£¬£¬²éÕÒ¸÷¸ö³§É̵ÄÇ徲ͨ¸æºÍ²úÆ·²¹¶¡ÏÂÔØµØµãÏ൱·±Ëö£¬£¬£¬ÄϹ¬NGÓéÀÖÌì¾µÎó²îÑо¿ÍŶÓÌØÎªÄúÖªÐÄÕûÀíÏà¹ØÐÅÏ¢ÈçÏ£º


£¨ÍøÂçÐÅÏ¢×èÖ¹µ½2018Äê1ÔÂ8ÈÕ£¬£¬£¬¸÷³§É̽«¼ÌÐøÍÆ³öÇå¾²¸üкͲ¹¶¡ÐÅÏ¢£¬£¬£¬ÄϹ¬NGÓéÀÖÌì¾µÎó²îÑо¿ÍŶӻá¼ÌÐø¼á³ÖÇ×½ü¹Ø×¢£¬£¬£¬Ò»Á¬¸üб¾Îĵµ£¬£¬£¬¿í´ó¿Í»§¿É´ÓÄϹ¬NGÓéÀÖ¹ÙÍø»ñÈ¡www.venustech.com.cn£©




Ó²¼þ




1. Intel


IntelÒѾ­È·ÈÏ1995ÄêÒÔºóÉú²úµÄËùÓд¦Öóͷ£Æ÷оƬÖб£´æÏà¹ØÎÊÌ⣬£¬£¬½«ÌṩÈí¼þºÍ¹Ì¼þ¸üÐÂÒÔ½â¾öÕâЩÎó²î ¡£¡£¡£°üÀ¨£º
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


IntelµÄÇ徲ͨ¸æÈçÏ£º


Ç徲ͨ¸æ


https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr


https://newsroom.intel.com/news/intel-responds-to-security-research-findings/


https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/


https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html




2. AR


ARMÈ·Èϴ󲿷ִ¦Öóͷ£Æ÷²»ÊÜÎó²îÓ°Ï죬£¬£¬µ«¸ø³öÁËÒ»¸öÊÜÓ°ÏìµÄ´¦Öóͷ£Æ÷ÁÐ±í ¡£¡£¡£

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾




1)Ç徲ͨ¸æ


https://developer.arm.com/support/security-update/download-the-whitepaper


https://developer.arm.com/support/security-update


2)²¹¶¡Á´½Ó


Õë¶ÔlinuxÉϵijÌÐò£¬£¬£¬ARMÌṩÁËбàÒëÆ÷£¬£¬£¬¿ÉÓÃбàÒëÖØÊÓбàÒë ¡£¡£¡£ÁíÍâÐû²¼ÁËLinux ARMÄں˲¹¶¡£¬£¬£¬ÓÃÓÚÐÞ²¹Îó²î£º


https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti




3. AMD


Ç徲ͨ¸æ


AMDÕë¶Ôÿ¸öÎó²î×öÁ˻ظ´£¬£¬£¬µÚÒ»¸öÎó²îÓÉÈí¼þ¡¢²Ù×÷ϵͳ³§ÉÌÐû²¼²¹¶¡½â¾ö£¬£¬£¬ÐÔÄÜÓ°ÏìºÜÊÇÉÔ΢£¬£¬£¬ÆäËûÁ½¸öÎó²îÓÉÓÚAMD CPUÌØÊâµÄ¼Ü¹¹£¬£¬£¬¶¼²»ÊÜÓ°Ïì ¡£¡£¡£ÏêϸÈçÏ£º


https://www.amd.com/en/corporate/speculative-execution




4. Nvidia


1)Ç徲ͨ¸æ


NvidiaÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼ ¡£¡£¡£Í¨¸æÈçÏ£º


https://www.nvidia.com/en-us/product-security/


2)²¹¶¡Á´½Ó


ÏêϸµÄ²¹¶¡Á´½ÓÈçÏ£º
 
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



 
²Ù×÷ϵͳ




1. Windows


1£©Ç徲ͨ¸æ


΢ÈíÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ£¬£¬£¬ÐÞ¸´ÁËIE¡¢Edge¡¢WindowsÄÚºËÖÐÏà¹ØÎÊÌâ ¡£¡£¡£
 
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©WindowsÊÜÓ°Ïì²úÆ·°üÀ¨£º


1. Windows 10
2. Windows 8
3. Windows 8.1
4. Windows 7
5. Windows Vista
6. Windows XP
7. Windows Server 2003
8. Windows Server 2008
9. Windows Server 2012
10. Windows Server 2012 R2
 
3£©²¹¶¡Á´½Ó

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾




 
2. Linux


LinuxÄں˿ª·¢ÕßThomas GleixnerÔÚ2017Äê12ÔÂÔÚLinuxÄÚºËÓʼþÁбíÖоÍеÄKAISER¸ôÀë²¹¶¡Ðû²¼ÁË˵Ã÷ ¡£¡£¡£ÏÖÔÚÓÐÈËÏÓÒÉÕâÅú²¹¶¡¿ÉÄÜÕýÊÇΪÏàʶ¾öLinuxϵͳµ±ÖеÄMetldownÓëSpectre Îó²î ¡£¡£¡£ÏêϸÈçÏ£º


https://lkml.org/lkml/2017/12/4/709




3. RedHat


1£©Ç徲ͨ¸æ


ºìñ¹«Ë¾ÒѾ­Ðû²¼Ò»ÏÒ飬£¬£¬ÆäÖÐÁгöÊܵ½Ó°ÏìµÄ²úÆ·¼°ÆäÄ¿½ñ״̬ ¡£¡£¡£½¨ÒéÄÚÈÝÅú×¢£º¹ØÓÚÕýÔÚÔËÐÐÊÜÓ°Ïì°æ±¾²úÆ·µÄºìñ¿Í»§£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìƾָ֤µ¼Çåµ¥¾ÙÐиüР¡£¡£¡£ËùÓÐÊÜÓ°Ïì²úÆ·¶¼Ó¦×°ÖÃÐÞ¸´²¹¶¡£¬£¬£¬½èÒÔ»º½âCVE-2017-5753 (±äÖÖ1)Óë CVE-2017-5754 (±äÖÖ3)Îó²î ¡£¡£¡£CVE-2017-5715 (±äÖÖ2)¿Éͨ¹ýÍâµØÒÔ¼°ÐéÄâ·Ã¿Í½çÏßÁ½ÖÖ·½·¨±»¼ÓÒÔʹÓà ¡£¡£¡£ÏêϸÈçÏ£º


https://access.redhat.com/security/vulnerabilities/speculativeexecution


2£©²¹¶¡Á´½Ó

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



4. SUSE


1£©Ç徲ͨ¸æ


SUSE¾ÍSLE Óë openSUSEÓ¦¶ÔMeltdown ºÍ Spectre CPUÎó²îÐû²¼ÉùÃ÷£¬£¬£¬SUSE Enterprise Linux£¨SLE£©ºÍOpenSuSE£¨Leap and Tumbleweed£©Ò²Êܵ½ÕâЩÑÏÖØµÄÓ²¼þ¹ýʧµÄÓ°Ï죬£¬£¬ÕâЩ¹ýʧ¿ÉÄÜ»áʹ·ÇÌØÈ¨µÄ¹¥»÷ÕßʹÓöñÒâÓ¦ÓóÌÐò´ÓÄÚºËÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£¡£¡£openSUSE Leap 42.2ºÍopenSUSE Leap 42.3Óû§¼´½«ÊÕµ½ÓëSUSE Linux Enterprise 12ÏàͬµÄÄں˸üР¡£¡£¡£ÁíÒ»·½Ã棬£¬£¬openSUSE¿ª·¢Ö°Ô±ÏÖÔÚÕýÔÚ½«Ð²¹¶¡³ÌÐòÒÆÖ²µ½openSUSE Tumbleweed½ÓÄÉÕ¾ ¡£¡£¡£


Ç徲ͨ¸æµØµãÈçÏ£º


https://www.suse.com/support/kb/doc/?id=7022512
 
2£©CVE-2017-5754²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5754/

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



4£©CVE-2017-5753²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5753/
 
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



5£©CVE-2017-5715²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5715/
 
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾



4. Ubuntu


1£©Ç徲ͨ¸æ


https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown


2£©²¹¶¡ÍýÏë


ÍýÏë1ÔÂ9ÈÕÐû²¼Äں˲¹¶¡£¬£¬£¬°æ±¾ºÅÈçÏ£º
ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾





5. Fedora


Çå¾²¸üÐÂ


Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º


https://bodhi.fedoraproject.org/updates/kernel-4.14.11-300.fc27
 


6. Debian


1£©Çå¾²¸üÐÂ


Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º£º


https://www.debian.org/security/2018/dsa-4078


https://security-tracker.debian.org/tracker/CVE-2017-5754
 
2£©²¹¶¡°ü

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾




7. macOS/IOS


Çå¾²¸üÐÂ


Æ»¹ûÔÚ12ÔÂ6ÈÕÐû²¼µÄ macOS 10.13.2ÒÔ¼°Îª¾ÉÏµÍ³ÍÆ³öµÄÇå¾²¸üУ¬£¬£¬ÒѰüÀ¨¡°Meltdown¡±Îó²îÐÞ²¹ ¡£¡£¡£1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£º
 


8. VMware


1£©Ç徲ͨ¸æ


VMwareÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼ ¡£¡£¡£Í¨¸æÈçÏ£º


https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html


2£©²¹¶¡Á´½Ó


ÏêϸµÄ²¹¶¡ÇéÐÎÈçÏ£º

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾




9. Xen


Ç徲ͨ¸æ


XenÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼ ¡£¡£¡£Í¨¸æÈçÏ£º


https://xenbits.xen.org/xsa/advisory-254.html




10. Amonzon


Ç徲ͨ¸æ


Amazon·½ÃæÒѾ­Ðû²¼Ò»ÏîÇ徲ͨ¸æ£¬£¬£¬Ö¸³ö£º´ËÏîÇå¾²Îó²îÆÕ±é±£´æÓÚÒÑÍù20ÄêÍÆ³öµÄÓ¢ÌØ¶û¡¢AMDÒÔ¼°ARMµÈÖÖÖÖÏÖ´ú´¦Öóͷ£Æ÷¼Ü¹¹µ±ÖУ¬£¬£¬Ó°Ïì¹æÄ£º­¸ÇЧÀÍÆ÷¡¢Ì¨Ê½»úÒÔ¼°Òƶ¯×°±¸ ¡£¡£¡£Amazon EC2ϵͳÖгýÉÙÉÙÊýÊµÆÆÀý£¬£¬£¬ÆäÓà½ÔÊܵ½ÑϿᱣ»£»¤ ¡£¡£¡£Ê£Óಿ·ÖµÄÐÞ¸´ÊÂÇ齫ÔÚ½ÓÏÂÀ´ÊýСʱÄÚÍê³É£¬£¬£¬²¢¸½ÓÐÏà¹ØÊµÀýά»¤Í¨Öª ¡£¡£¡£ËäÈ»AWSËùÖ´ÐеĸüÐÂÄܹ»ÇÐʵ±£»£»¤µ×²ã»ù´¡ÉèÊ©£¬£¬£¬µ«ÎªÁ˳ä·Ö½â¾ö´Ë´ÎÎÊÌ⣬£¬£¬¿Í»§»¹Ó¦¶ÔʵÀýÖеIJÙ×÷ϵͳ¾ÙÐÐÐÞ¸´ ¡£¡£¡£ÏÖÔÚAmazon Linux¸üÐÂÒѾ­×îÏÈÐû²¼£¬£¬£¬ÏêϸÈçÏ£º


https://aws.amazon.com/security/security-bulletins/AWS-2018-013/




11. ChromeOS


Ç徲ͨ¸æ


https://support.google.com/faqs/answer/7622138#chromeos
 


12. °²×¿


Ç徲ͨ¸æ


AndroidÍŶÓÓÚ2018Äê1Ô¸üÐÂÁËÇ徲ͨ¸æ£ºCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754ΪÒѾ­»ñµÃ¹ûÕæÅû¶µÄһϵÁÐÓë´¦Öóͷ£Æ÷ÄÚÍÆ²âÖ´ÐÐÏà¹ØµÄÎó²î ¡£¡£¡£AndroidÉÐδ·¢Ã÷ÈκÎÔÚ»ùÓÚARMµÄAndroid×°±¸Ö®ÉÏÖØÏÖÉÏÊöÎó²îÒÔ¾ÙÐеÄδÊÚȨÐÅϢй¶ÐÐΪ ¡£¡£¡£ÎªÁËÌá¹©ÌØÁíÍâ±£»£»¤²½·¥£¬£¬£¬±¾Í¨¸æµ±ÖаüÀ¨µÄCVE-2017-13218¸üÐÂïÔÌ­Á˶Ը߾«¶È׼ʱÆ÷µÄ»á¼û£¬£¬£¬Ö¼ÔÚÏÞÖÆÅÔ·¹¥»÷£¨ÀýÈçCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754£©ËùÓÐÒÑÖª±äÖÖ¶ÔARM´¦Öóͷ£Æ÷µÄÓ°Ïì ¡£¡£¡£ÏêϸÈçÏ£º


https://source.android.com/security/bulletin/2018-01-01
 


Ó¦ÓÃ




1. IE/Edge


1£©Ç徲ͨ¸æ


΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
 
2£©²¹¶¡Á´½Ó


Internet Explorer 9-11²¹¶¡ºÅkb4056568£¬£¬£¬


ÏÂÔØµØµã:


http://www.catalog.update.microsoft.com/search.aspx?q=kb4056568
 
3£©Edge²¹¶¡ÏÂÔØµØµã:


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056893


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056888


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056890


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056891


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892
 


2. Mozilla


1£©Ç徲ͨ¸æ


Firefox 57.0.4ÐÞÕý°æ±¾ÐÞ¸´ÁËÖøÃûµÄÁ½¸öÓ¢ÌØ¶ûCPUÎó²î´øÀ´µÄÇå¾²ÐÔÎÊÌ⣬£¬£¬ÍƼöËùÓÐ57°æ±¾Óû§ÊµÊ±Éý¼¶ ¡£¡£¡£Í¨¸æÈçÏ£º
https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
 
2£©²¹¶¡Á´½Ó


²¹¶¡ÏÂÔØµØµã£º


https://download-installer.cdn.mozilla.net/pub/firefox/releases/57.0.4/
 


3. Safari


Çå¾²¸üÐÂ


1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£¬£¬£¬ÈçÐèÏàʶ¸üеÄÇå¾²ÐÔÄÚÈÝ£¬£¬£¬Çë»á¼û´ËÍøÕ¾£º


https://support.apple.com/zh-cn/HT201222
 


4. SQLserver


1£©Ç徲ͨ¸æ
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©²¹¶¡Á´½Ó£º


SQL Server 2016 SP1²¹¶¡ÏÂÔØµØµã£º


https://www.microsoft.com/en-us/download/details.aspx?id=54613