MeltdownºÍSpectre·ì϶°²È«¹«¸æ¼°²¹¶¡´óÈ«

°ä²¼¹¦·ò 2018-01-09
½üÈÕ£¬GoogleµÄProject ZeroÍŶӰ䷢ÐÂÎųÆ£¬ËûÃÇ·¢ÏÖÁËMeltdown£¨ÈÛ¶Ï£¬CVE-2017-5754£©ºÍSpectre£¨¹í»ê£¬CVE-2017-5753/CVE-2017-5715£©Á½¸öCPU¼¶´ËÍâ·ì϶¡£Óйطì϶ÀûÓÃÁËоƬӲ¼þ²ãÃæÖ´Ðмӿì»úÔìµÄÉè¼ÆÈ±µãʵÏÖ²àÐÅ·¹¥»÷£¬Äܹ»¼ä½Óͨ¹ýCPU»º´æ¶ÁȡϵͳÄÚ´æÊý¾Ý¡£Õâ´Î±»ÆØ¹âµÄ·ì϶²¨¼°ÁìÓò¹ã£¬ÏÕЩȫÇòËùÓеÄÍÆËãÉ豸¶¼ÊÜÓ°Ï죬ÒѾ­ÒýÆðÊÀ½çÁìÓòÄÚµÄ¿í·º¹Ø×¢¡£¹ÌÈ»µ±Ç°ÉÐδÓÐÀûÓÃÕâÁ½¸ö·ì϶½øÐй¥»÷µÄÊÂÎñ´«µÝ£¬GA»Æ½ð¼×Ìì¾µ·ì϶×êÑÐÍŶÓÌáÐÑ¿í´ó¿Í»§·À»¼ÓÚδȻ£¬ÊµÊ±½¨²¹·ì϶¡£


Meltdown·ì϶ӰÏìÏÕЩËùÓеÄIntel CPUºÍ²¿ÃÅARM CPU£¬¶øSpectreÔòÓ°ÏìËùÓеÄIntel CPUºÍAMD CPU£¬ÒÔ¼°Ö÷Á÷µÄARM CPU¡£Á½×é·ì϶ӰÏìµÄ²Ù×÷ϵͳº­¸ÇĿǰÏÕЩËùÓÐÍÆËãÉ豸¡£Ô̺¬Windows£¬Android£¬MacOS £¬IOS£¬Linux£¨Red hat/Debian/Ubuntu/Suse£©µÈ¡£ÎªÁ˰²È«Æð¼û£¬ÊÐÃæÉÏËùÓеķþÎñÆ÷¡¢Ó×ÎÒµçÄÔ¡¢ÊÖ»úµÈ¶¼±ØÒªÉý¼¶Ó¦¶Ô¡£µ«Í¬Ê±Ò²Òª¿´µ½Õâ¸ö·ì϶ÀûÓÃÓп϶¨µÄÃż÷£¬¼´·½±ãÓóɹ¦£¬Ò²Ö»ÄÜÈù¥»÷ÕßÇÔÈ¡Ãô¸ÐÊý¾Ý£¬²»ÄÜÌáȨºÍ½ÚÔìÖ÷»ú¡£¹í»ê·ì϶¶Ô¶à×⻧ϵÄÔÆ·þÎñϵͳӰÏì±ÈÁ¦´ó£¬¹¥»÷ÕßÔÚÔÆÆ½Ì¨Í¨¹ý±¾µØµÄͨ³£µÄ½Ó¼ûȨÏÞ¾ÍÄܹ»¶ÁÈ¡ÔÆÆ½Ì¨µÄÃô¸ÐÐÅÏ¢£¬Îª½øÒ»²½»ñµÃ¸ü¸ßµÄȨÏ޺ͻñµÃ»úÃÜÊý¾ÝÌṩÁË¿ÉÄÜ¡£Áí±í˼¿¼µ½Éý¼¶ÁËCPUºÍ²Ù×÷ϵͳ֮ºó°éËæµÄ»úÄܽµÂ䣬·ÖÆçÓû§Äܹ»ÆÀ¹À×Ô¼ºµÄÇé¿öÀ´×ö³ö¾ö¶¨¡£½¨ÒéÓ×ÎÒÓû§ÖØÒªÉý¼¶²Ù×÷ϵͳ²¹¶¡¼°ä¯ÀÀÆ÷°æ±¾¡£


Õë¶ÔÕâÁ½×é·ì϶£¬¸÷¼ÒоƬ³§ÉÌ£¬²Ù×÷ϵͳ³§ÉÌ£¬ä¯ÀÀÆ÷³§ÉÌ£¬ÒÔ¼°ÔÆ·þÎñ³§ÉÌ£¬¶¼»ý¼«²ÉÈ¡´ëÊ©£¬°ä²¼°²È«²¼¸æ£¬²¢ÊµÊ±ÍƳö»º½â´ëÊ©ºÍ½¨¸´²¹¶¡¡£¼øÓÚ´ËÁ½×é·ì϶ӰÏìÃæ¾Þ´ó£¬²éÕÒ¸÷¸ö³§É̵ݲȫ¹«¸æºÍ²úÆ·²¹¶¡ÏÂÔØµØÖ·Ï൱·±Ëö£¬GA»Æ½ð¼×Ìì¾µ·ì϶×êÑÐÍŶÓÌØÎªÄúÌùÐÄÕû¶ÙÓйØÐÅÏ¢ÈçÏ£º


£¨ÍøÂçÐÅÏ¢½ØÖÁµ½2018Äê1ÔÂ8ÈÕ£¬¸÷³§É̽«³ÖÐøÍÆ³ö°²È«¸üкͲ¹¶¡ÐÅÏ¢£¬GA»Æ½ð¼×Ìì¾µ·ì϶×êÑÐÍŶӻá³ÖÐøÎ¬³ÖÇ×êǹØ×¢£¬³ÖÐø¸üб¾Îĵµ£¬¿í´ó¿Í»§¿É´ÓGA»Æ½ð¼×¹ÙÍø»ñÈ¡www.venustech.com.cn£©




Ó²¼þ




1. Intel


IntelÒѾ­È·ÈÏ1995ÄêÒÔÀ´³ö²úµÄËùÓд¦ÖÃÆ÷оƬÖдæÔÚÓйØÎÊÌ⣬½«ÌṩÈí¼þºÍ¹Ì¼þ¸üÐÂÒÔ½â¾öÕâЩ·ì϶¡£Ô̺¬£º
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IntelµÄ°²È«²¼¸æÈçÏ£º


°²È«¹«¸æ


https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr


https://newsroom.intel.com/news/intel-responds-to-security-research-findings/


https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/


https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html




2. AR


ARMÈ·ÈÏ´ó²¿ÃÅ´¦ÖÃÆ÷²»ÊÜ·ì϶ӰÏ죬µ«¸ø³öÁËÒ»¸öÊÜÓ°ÏìµÄ´¦ÖÃÆ÷Áбí¡£

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾




1)°²È«¹«¸æ


https://developer.arm.com/support/security-update/download-the-whitepaper


https://developer.arm.com/support/security-update


2)²¹¶¡Á´½Ó


Õë¶ÔlinuxÉϵķ¨Ê½£¬ARMÌṩÁËбàÒëÆ÷£¬¿ÉÓÃбàÒëÆ÷³ÁбàÒë¡£Áí±í°ä²¼ÁËLinux ARMÄں˲¹¶¡£¬ÓÃÓÚ½¨²¹·ì϶£º


https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti




3. AMD


°²È«¹«¸æ


AMDÕë¶Ôÿ¸ö·ì϶×öÁ˻ظ´£¬µÚÒ»¸ö·ì϶ÓÉÈí¼þ¡¢²Ù×÷ϵͳ³§Ḛ́䲼²¹¶¡½â¾ö£¬»úÄÜÓ°Ï켫¶ÈÇá΢£¬ÆäËûÁ½¸ö·ì϶ÓÉÓÚAMD CPUÌØÊâµÄ¼Ü¹¹£¬¶¼²»ÊÜÓ°Ïì¡£¾ßÌåÈçÏ£º


https://www.amd.com/en/corporate/speculative-execution




4. Nvidia


1)°²È«¹«¸æ


NvidiaÒѾ­°ä²¼Á˰²È«¹«¸æ,ÍÆ¼öÓйصÄÇý¶¯·¨Ê½»òÈí¼þ°ü¸üдÍÓëÁìµ¼¡£²¼¸æÈçÏ£º


https://www.nvidia.com/en-us/product-security/


2)²¹¶¡Á´½Ó


¾ßÌåµÄ²¹¶¡Á´½ÓÈçÏ£º
 
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



 
²Ù×÷ϵͳ




1. Windows


1£©°²È«¹«¸æ


΢ÈíÒѾ­°ä²¼Á˰²È«¹«¸æ£¬½¨¸´ÁËIE¡¢Edge¡¢WindowsÄÚºËÖÐÓйØÎÊÌâ¡£
 
΢Èí°²È«¹«¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©WindowsÊÜÓ°Ïì²úÆ·Ô̺¬£º


1. Windows 10
2. Windows 8
3. Windows 8.1
4. Windows 7
5. Windows Vista
6. Windows XP
7. Windows Server 2003
8. Windows Server 2008
9. Windows Server 2012
10. Windows Server 2012 R2
 
3£©²¹¶¡Á´½Ó

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾




 
2. Linux


LinuxÄں˿ª·¢ÕßThomas GleixnerÔÚ2017Äê12ÔÂÔÚLinuxÄÚºËÓʼþÁбíÖоÍеÄKAISER¸ôÀë²¹¶¡°ä²¼ÁË×¢Ã÷¡£Ä¿Ç°ÓÐÈËÒÉ»óÕâÅú²¹¶¡¿ÉÄÜÕýÊÇΪÏàʶ¾öLinuxϵͳ°ø±ßµÄMetldownÓëSpectre ·ì϶¡£¾ßÌåÈçÏ£º


https://lkml.org/lkml/2017/12/4/709




3. RedHat


1£©°²È«¹«¸æ


ºìñ¹«Ë¾ÒѾ­°ä²¼Ò»ÏÒ飬ÆäÖÐÁгöÊܵ½Ó°ÏìµÄ²úÆ·¼°Æäµ±Ç°×´Ì¬¡£½¨ÒéÄÚÈÝÅú×¢£º¶ÔÓÚÔÚÔËÐÐÊÜÓ°Ïì°æ±¾²úÆ·µÄºìñ¿Í»§£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìƾ¾ÝÁìµ¼Çåµ¥½øÐиüС£ËùÓÐÊÜÓ°Ïì²úÆ·¶¼Ó¦×°Öý¨¸´²¹¶¡£¬½èÒÔ»º½âCVE-2017-5753 (±äÖÖ1)Óë CVE-2017-5754 (±äÖÖ3)·ì϶¡£CVE-2017-5715 (±äÖÖ2)¿Éͨ¹ý±¾µØÒÔ¼°Ðé¹¹·Ã¿ÍÌìǵÁ½ÖÖ·½Ê½±»¼ÓÒÔÀûÓ᣾ßÌåÈçÏ£º


https://access.redhat.com/security/vulnerabilities/speculativeexecution


2£©²¹¶¡Á´½Ó

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



4. SUSE


1£©°²È«¹«¸æ


SUSE¾ÍSLE Óë openSUSEÓ¦¶ÔMeltdown ºÍ Spectre CPU·ì϶°ä²¼ÉêÃ÷£¬SUSE Enterprise Linux£¨SLE£©ºÍOpenSuSE£¨Leap and Tumbleweed£©Ò²Êܵ½ÕâЩÑϳÁµÄÓ²¼þÃýÎóµÄÓ°Ï죬ÕâЩÃýÎó¿ÉÄÜ»áʹ·ÇÌØÈ¨µÄ¹¥»÷ÕßÀûÓöñÒâÀûÓ÷¨Ê½´ÓÄÚºËÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£openSUSE Leap 42.2ºÍopenSUSE Leap 42.3Óû§¼´½«ÊÕµ½ÓëSUSE Linux Enterprise 12Ò»ÑùµÄÄں˸üС£ÁíÒ»·½Ã棬openSUSE¿ª·¢ÈËԱĿǰÔÚ½«Ð²¹¶¡·¨Ê½ÒÆÖ²µ½openSUSE Tumbleweed»ØÊÕÕ¾¡£


°²È«¹«¸æµØÖ·ÈçÏ£º


https://www.suse.com/support/kb/doc/?id=7022512
 
2£©CVE-2017-5754²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5754/

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



4£©CVE-2017-5753²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5753/
 
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



5£©CVE-2017-5715²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5715/
 
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



4. Ubuntu


1£©°²È«¹«¸æ


https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown


2£©²¹¶¡´òËã


´òËã1ÔÂ9ÈÕ°ä²¼Äں˲¹¶¡£¬°æ±¾ºÅÈçÏ£º
GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾





5. Fedora


°²È«¸üÐÂ


°ä²¼Á˰²È«¸üУ¬Ô̺¬¶ÔCVE-2017-5754 (Meltdown)µÄ½¨²¹£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º


https://bodhi.fedoraproject.org/updates/kernel-4.14.11-300.fc27
 


6. Debian


1£©°²È«¸üÐÂ


°ä²¼Á˰²È«¸üУ¬Ô̺¬¶ÔCVE-2017-5754 (Meltdown)µÄ½¨²¹£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º£º


https://www.debian.org/security/2018/dsa-4078


https://security-tracker.debian.org/tracker/CVE-2017-5754
 
2£©²¹¶¡°ü

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾




7. macOS/IOS


°²È«¸üÐÂ


Æ»¹ûÔÚ12ÔÂ6ÈÕ°ä²¼µÄ macOS 10.13.2ÒÔ¼°Îª¾ÉÏµÍ³ÍÆ³öµÄ°²È«¸üУ¬ÒÑÔ̺¬¡°Meltdown¡±·ì϶½¨²¹¡£1ÔÂ8ÈÕÆ»¹û¹«Ë¾°ä²¼iOS 11.2.2Õýʽ°æ¸üУ¬ÖØÒª½¨¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre °²È«·ì϶£¨CVE-2017-5753 and CVE-2017-5715£©£º
 


8. VMware


1£©°²È«¹«¸æ


VMwareÒѾ­°ä²¼Á˰²È«¹«¸æ,ÍÆ¼öÓйصÄÇý¶¯·¨Ê½»òÈí¼þ°ü¸üдÍÓëÁìµ¼¡£²¼¸æÈçÏ£º


https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html


2£©²¹¶¡Á´½Ó


¾ßÌåµÄ²¹¶¡Çé¿öÈçÏ£º

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾




9. Xen


°²È«¹«¸æ


XenÒѾ­°ä²¼Á˰²È«¹«¸æ,ÍÆ¼öÓйصÄÇý¶¯·¨Ê½»òÈí¼þ°ü¸üдÍÓëÁìµ¼¡£²¼¸æÈçÏ£º


https://xenbits.xen.org/xsa/advisory-254.html




10. Amonzon


°²È«¹«¸æ


Amazon·½ÃæÒѾ­°ä²¼Ò»Ïȫ²¼¸æ£¬Ö¸³ö£º´ËÏȫ·ì϶¿í·º´æÔÚÓÚ´Óǰ20ÄêÍÆ³öµÄÓ¢ÌØ¶û¡¢AMDÒÔ¼°ARMµÈ¸÷ÀàÏÖ´ú´¦ÖÃÆ÷¼Ü¹¹°ø±ß£¬Ó°ÏìÁìÓòº­¸Ç·þÎñÆ÷¡¢Ì¨Ê½»úÒÔ¼°Òƶ¯É豸¡£Amazon EC2ϵͳÖгý¼«ÉÙÊýÊ·ý±í£¬ÆäÓà½ÔÊܵ½Ñϸñ±£»¤¡£Ôü×Ò²¿ÃŵĽ¨¸´¹¤×÷½«ÔÚ½ÓÏÂÀ´ÊýÓ×ʱÄÚʵÏÖ£¬²¢¸½ÓÐÓйØÊ·ýÊØ»¤Í¨Öª¡£¹ÌÈ»AWSËùÖ´ÐеĸüпÉÄÜÇÐʵ±£»¤µ×²ã»ù´¡ÉèÊ©£¬µ«ÎªÁ˳ä·Ö½â¾öÕâ´ÎÎÊÌ⣬¿Í»§»¹Ó¦¶ÔÊ·ýÖеIJÙ×÷ϵͳ½øÐн¨¸´¡£Ä¿Ç°Amazon Linux¸üÐÂÒѾ­ÆðÍ·°ä²¼£¬¾ßÌåÈçÏ£º


https://aws.amazon.com/security/security-bulletins/AWS-2018-013/




11. ChromeOS


°²È«¹«¸æ


https://support.google.com/faqs/answer/7622138#chromeos
 


12. °²×¿


°²È«¹«¸æ


AndroidÍŶÓÓÚ2018Äê1Ô¸üÐÂÁ˰²È«¹«¸æ£ºCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754ΪÒѾ­µÃµ½¹«¿ªÅû¶µÄһϵÁÐÓë´¦ÖÃÆ÷ÄÚ´§Ä¦Ö´ÐÐÓйصķì϶¡£AndroidÉÐδ·¢ÏÖÈκÎÔÚ»ùÓÚARMµÄAndroidÉ豸֮ÉϳÁÏÖÉÏÊö·ì϶ÒÔ½øÐеÄδÊÚȨÐÅϢй¶ÐÐΪ¡£ÎªÁËÌṩ¶î±íµÄ±£»¤´ëÊ©£¬±¾²¼¸æ°ø±ßÔ̺¬µÄCVE-2017-13218¸üÐÂÏ÷¼õÁ˶Ը߾«¶È°´Ê±Æ÷µÄ½Ó¼û£¬Ö¼ÔÚÏÞ¶ÈÅÔ·¹¥»÷£¨ÀýÈçCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754£©ËùÓÐÒÑÖª±äÖÖ¶ÔARM´¦ÖÃÆ÷µÄÓ°Ïì¡£¾ßÌåÈçÏ£º


https://source.android.com/security/bulletin/2018-01-01
 


ÀûÓÃ




1. IE/Edge


1£©°²È«¹«¸æ


΢Èí°²È«¹«¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
 
2£©²¹¶¡Á´½Ó


Internet Explorer 9-11²¹¶¡ºÅkb4056568£¬


ÏÂÔØµØÖ·:


http://www.catalog.update.microsoft.com/search.aspx?q=kb4056568
 
3£©Edge²¹¶¡ÏÂÔØµØÖ·:


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056893


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056888


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056890


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056891


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892
 


2. Mozilla


1£©°²È«¹«¸æ


Firefox 57.0.4½¨¸Ä°æ±¾½¨¸´Á˳ÛÃûµÄÁ½¸öÓ¢ÌØ¶ûCPU·ì϶´øÀ´µÄ°²È«ÐÔÎÊÌ⣬ÍƼöËùÓÐ57°æ±¾Óû§ÊµÊ±Éý¼¶¡£²¼¸æÈçÏ£º
https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
 
2£©²¹¶¡Á´½Ó


²¹¶¡ÏÂÔØµØÖ·£º


https://download-installer.cdn.mozilla.net/pub/firefox/releases/57.0.4/
 


3. Safari


°²È«¸üÐÂ


1ÔÂ8ÈÕÆ»¹û¹«Ë¾°ä²¼iOS 11.2.2Õýʽ°æ¸üУ¬ÖØÒª½¨¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre °²È«·ì϶£¨CVE-2017-5753 and CVE-2017-5715£©£¬ÈçÐèÏàʶ¸üÐµİ²È«ÐÔÄÚÈÝ£¬Çë½Ó¼û´ËÍøÕ¾£º


https://support.apple.com/zh-cn/HT201222
 


4. SQLserver


1£©°²È«¹«¸æ
΢Èí°²È«¹«¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©²¹¶¡Á´½Ó£º


SQL Server 2016 SP1²¹¶¡ÏÂÔØµØÖ·£º


https://www.microsoft.com/en-us/download/details.aspx?id=54613