MeltdownºÍSpectreÎó²îÇ徲ͨ¸æ¼°²¹¶¡´óÈ«

Ðû²¼Ê±¼ä 2018-01-09
¿ËÈÕ£¬£¬£¬£¬GoogleµÄProject ZeroÍŶӽÒÏþÐÂÎųÆ£¬£¬£¬£¬ËûÃÇ·¢Ã÷ÁËMeltdown£¨ÈÛ¶Ï£¬£¬£¬£¬CVE-2017-5754£©ºÍSpectre£¨ÓÄÁ飬£¬£¬£¬CVE-2017-5753/CVE-2017-5715£©Á½¸öCPU¼¶±ðµÄÎó²î¡£¡£¡£Ïà¹ØÎó²îʹÓÃÁËоƬӲ¼þ²ãÃæÖ´ÐмÓËÙ»úÖÆµÄÉè¼ÆÈ±ÏÝʵÏÖ²àÐŵÀ¹¥»÷£¬£¬£¬£¬¿ÉÒÔ¼ä½Óͨ¹ýCPU»º´æ¶ÁȡϵͳÄÚ´æÊý¾Ý¡£¡£¡£´Ë´Î±»ÆØ¹âµÄÎó²î²¨¼°¹æÄ£¹ã£¬£¬£¬£¬ÏÕЩȫÇòËùÓеÄÅÌËã×°±¸¶¼ÊÜÓ°Ï죬£¬£¬£¬ÒѾ­ÒýÆðÌìϹæÄ£ÄÚµÄÆÕ±é¹Ø×¢¡£¡£¡£ËäȻĿ½ñÉÐδÓÐʹÓÃÕâÁ½¸öÎó²î¾ÙÐй¥»÷µÄÊÂÎñת´ï£¬£¬£¬£¬ÈËÉú¾ÍÊDz©Ìì¾µÎó²îÑо¿ÍŶÓÌáÐÑ¿í´ó¿Í»§·À»¼ÓÚδȻ£¬£¬£¬£¬ÊµÊ±ÐÞ²¹Îó²î¡£¡£¡£


MeltdownÎó²îÓ°ÏìÏÕЩËùÓеÄIntel CPUºÍ²¿·ÖARM CPU£¬£¬£¬£¬¶øSpectreÔòÓ°ÏìËùÓеÄIntel CPUºÍAMD CPU£¬£¬£¬£¬ÒÔ¼°Ö÷Á÷µÄARM CPU¡£¡£¡£Á½×éÎó²îÓ°ÏìµÄ²Ù×÷ϵͳº­¸ÇÏÖÔÚÏÕЩËùÓÐÅÌËã×°±¸¡£¡£¡£°üÀ¨Windows£¬£¬£¬£¬Android£¬£¬£¬£¬MacOS £¬£¬£¬£¬IOS£¬£¬£¬£¬Linux£¨Red hat/Debian/Ubuntu/Suse£©µÈ¡£¡£¡£ÎªÁËÇå¾²Æð¼û£¬£¬£¬£¬ÊÐÃæÉÏËùÓеÄЧÀÍÆ÷¡¢Ð¡ÎÒ˽¼ÒµçÄÔ¡¢ÊÖ»úµÈ¶¼ÐèÒªÉý¼¶Ó¦¶Ô¡£¡£¡£µ«Í¬Ê±Ò²Òª¿´µ½Õâ¸öÎó²îʹÓÃÓÐÒ»¶¨µÄÃż÷£¬£¬£¬£¬×ÝȻʹÓÃÀֳɣ¬£¬£¬£¬Ò²Ö»ÄÜÈù¥»÷ÕßÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬²»¿ÉÌáȨºÍ¿ØÖÆÖ÷»ú¡£¡£¡£ÓÄÁéÎó²î¶Ô¶à×⻧ϵÄÔÆÐ§ÀÍϵͳӰÏì½ÏÁ¿´ó£¬£¬£¬£¬¹¥»÷ÕßÔÚÔÆÆ½Ì¨Í¨¹ýÍâµØµÄͨË׵Ļá¼ûȨÏ޾ͿÉÒÔ¶ÁÈ¡ÔÆÆ½Ì¨µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬Îª½øÒ»²½»ñµÃ¸ü¸ßµÄȨÏ޺ͻñµÃÉñÃØÊý¾ÝÌṩÁË¿ÉÄÜ¡£¡£¡£ÁíÍâ˼Á¿µ½Éý¼¶ÁËCPUºÍ²Ù×÷ϵͳ֮ºóÅãͬµÄÐÔÄÜϽµ£¬£¬£¬£¬²î±ðÓû§¿ÉÒÔÆÀ¹À×Ô¼ºµÄÇéÐÎÀ´×ö³ö¾öÒé¡£¡£¡£½¨ÒéСÎÒ˽¼ÒÓû§Ö÷ÒªÉý¼¶²Ù×÷ϵͳ²¹¶¡¼°ä¯ÀÀÆ÷°æ±¾¡£¡£¡£


Õë¶ÔÕâÁ½×éÎó²î£¬£¬£¬£¬¸÷¼ÒоƬ³§ÉÌ£¬£¬£¬£¬²Ù×÷ϵͳ³§ÉÌ£¬£¬£¬£¬ä¯ÀÀÆ÷³§ÉÌ£¬£¬£¬£¬ÒÔ¼°ÔÆÐ§Àͳ§ÉÌ£¬£¬£¬£¬¶¼Æð¾¢½ÓÄɲ½·¥£¬£¬£¬£¬Ðû²¼Ç徲ͨ¸æ£¬£¬£¬£¬²¢ÊµÊ±ÍƳö»º½â²½·¥ºÍÐÞ¸´²¹¶¡¡£¡£¡£¼øÓÚ´ËÁ½×éÎó²îÓ°ÏìÃæÖØ´ó£¬£¬£¬£¬²éÕÒ¸÷¸ö³§É̵ÄÇ徲ͨ¸æºÍ²úÆ·²¹¶¡ÏÂÔØµØµãÏ൱·±Ëö£¬£¬£¬£¬ÈËÉú¾ÍÊDz©Ìì¾µÎó²îÑо¿ÍŶÓÌØÎªÄúÖªÐÄÕûÀíÏà¹ØÐÅÏ¢ÈçÏ£º


£¨ÍøÂçÐÅÏ¢×èÖ¹µ½2018Äê1ÔÂ8ÈÕ£¬£¬£¬£¬¸÷³§É̽«¼ÌÐøÍÆ³öÇå¾²¸üкͲ¹¶¡ÐÅÏ¢£¬£¬£¬£¬ÈËÉú¾ÍÊDz©Ìì¾µÎó²îÑо¿ÍŶӻá¼ÌÐø¼á³ÖÇ×½ü¹Ø×¢£¬£¬£¬£¬Ò»Á¬¸üб¾Îĵµ£¬£¬£¬£¬¿í´ó¿Í»§¿É´ÓÈËÉú¾ÍÊDz©¹ÙÍø»ñÈ¡www.venustech.com.cn£©




Ó²¼þ




1. Intel


IntelÒѾ­È·ÈÏ1995ÄêÒÔºóÉú²úµÄËùÓд¦Öóͷ£Æ÷оƬÖб£´æÏà¹ØÎÊÌ⣬£¬£¬£¬½«ÌṩÈí¼þºÍ¹Ì¼þ¸üÐÂÒÔ½â¾öÕâЩÎó²î¡£¡£¡£°üÀ¨£º
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


IntelµÄÇ徲ͨ¸æÈçÏ£º


Ç徲ͨ¸æ


https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr


https://newsroom.intel.com/news/intel-responds-to-security-research-findings/


https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/


https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html




2. AR


ARMÈ·Èϴ󲿷ִ¦Öóͷ£Æ÷²»ÊÜÎó²îÓ°Ï죬£¬£¬£¬µ«¸ø³öÁËÒ»¸öÊÜÓ°ÏìµÄ´¦Öóͷ£Æ÷ÁÐ±í¡£¡£¡£

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø




1)Ç徲ͨ¸æ


https://developer.arm.com/support/security-update/download-the-whitepaper


https://developer.arm.com/support/security-update


2)²¹¶¡Á´½Ó


Õë¶ÔlinuxÉϵijÌÐò£¬£¬£¬£¬ARMÌṩÁËбàÒëÆ÷£¬£¬£¬£¬¿ÉÓÃбàÒëÖØÊÓбàÒë¡£¡£¡£ÁíÍâÐû²¼ÁËLinux ARMÄں˲¹¶¡£¬£¬£¬£¬ÓÃÓÚÐÞ²¹Îó²î£º


https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti




3. AMD


Ç徲ͨ¸æ


AMDÕë¶Ôÿ¸öÎó²î×öÁ˻ظ´£¬£¬£¬£¬µÚÒ»¸öÎó²îÓÉÈí¼þ¡¢²Ù×÷ϵͳ³§ÉÌÐû²¼²¹¶¡½â¾ö£¬£¬£¬£¬ÐÔÄÜÓ°ÏìºÜÊÇÉÔ΢£¬£¬£¬£¬ÆäËûÁ½¸öÎó²îÓÉÓÚAMD CPUÌØÊâµÄ¼Ü¹¹£¬£¬£¬£¬¶¼²»ÊÜÓ°Ïì¡£¡£¡£ÏêϸÈçÏ£º


https://www.amd.com/en/corporate/speculative-execution




4. Nvidia


1)Ç徲ͨ¸æ


NvidiaÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º


https://www.nvidia.com/en-us/product-security/


2)²¹¶¡Á´½Ó


ÏêϸµÄ²¹¶¡Á´½ÓÈçÏ£º
 
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



 
²Ù×÷ϵͳ




1. Windows


1£©Ç徲ͨ¸æ


΢ÈíÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ£¬£¬£¬£¬ÐÞ¸´ÁËIE¡¢Edge¡¢WindowsÄÚºËÖÐÏà¹ØÎÊÌâ¡£¡£¡£
 
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©WindowsÊÜÓ°Ïì²úÆ·°üÀ¨£º


1. Windows 10
2. Windows 8
3. Windows 8.1
4. Windows 7
5. Windows Vista
6. Windows XP
7. Windows Server 2003
8. Windows Server 2008
9. Windows Server 2012
10. Windows Server 2012 R2
 
3£©²¹¶¡Á´½Ó

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø




 
2. Linux


LinuxÄں˿ª·¢ÕßThomas GleixnerÔÚ2017Äê12ÔÂÔÚLinuxÄÚºËÓʼþÁбíÖоÍеÄKAISER¸ôÀë²¹¶¡Ðû²¼ÁË˵Ã÷¡£¡£¡£ÏÖÔÚÓÐÈËÏÓÒÉÕâÅú²¹¶¡¿ÉÄÜÕýÊÇΪÏàʶ¾öLinuxϵͳµ±ÖеÄMetldownÓëSpectre Îó²î¡£¡£¡£ÏêϸÈçÏ£º


https://lkml.org/lkml/2017/12/4/709




3. RedHat


1£©Ç徲ͨ¸æ


ºìñ¹«Ë¾ÒѾ­Ðû²¼Ò»ÏÒ飬£¬£¬£¬ÆäÖÐÁгöÊܵ½Ó°ÏìµÄ²úÆ·¼°ÆäÄ¿½ñ״̬¡£¡£¡£½¨ÒéÄÚÈÝÅú×¢£º¹ØÓÚÕýÔÚÔËÐÐÊÜÓ°Ïì°æ±¾²úÆ·µÄºìñ¿Í»§£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìƾָ֤µ¼Çåµ¥¾ÙÐиüС£¡£¡£ËùÓÐÊÜÓ°Ïì²úÆ·¶¼Ó¦×°ÖÃÐÞ¸´²¹¶¡£¬£¬£¬£¬½èÒÔ»º½âCVE-2017-5753 (±äÖÖ1)Óë CVE-2017-5754 (±äÖÖ3)Îó²î¡£¡£¡£CVE-2017-5715 (±äÖÖ2)¿Éͨ¹ýÍâµØÒÔ¼°ÐéÄâ·Ã¿Í½çÏßÁ½ÖÖ·½·¨±»¼ÓÒÔʹÓᣡ£¡£ÏêϸÈçÏ£º


https://access.redhat.com/security/vulnerabilities/speculativeexecution


2£©²¹¶¡Á´½Ó

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



4. SUSE


1£©Ç徲ͨ¸æ


SUSE¾ÍSLE Óë openSUSEÓ¦¶ÔMeltdown ºÍ Spectre CPUÎó²îÐû²¼ÉùÃ÷£¬£¬£¬£¬SUSE Enterprise Linux£¨SLE£©ºÍOpenSuSE£¨Leap and Tumbleweed£©Ò²Êܵ½ÕâЩÑÏÖØµÄÓ²¼þ¹ýʧµÄÓ°Ï죬£¬£¬£¬ÕâЩ¹ýʧ¿ÉÄÜ»áʹ·ÇÌØÈ¨µÄ¹¥»÷ÕßʹÓöñÒâÓ¦ÓóÌÐò´ÓÄÚºËÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£¡£¡£openSUSE Leap 42.2ºÍopenSUSE Leap 42.3Óû§¼´½«ÊÕµ½ÓëSUSE Linux Enterprise 12ÏàͬµÄÄں˸üС£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬openSUSE¿ª·¢Ö°Ô±ÏÖÔÚÕýÔÚ½«Ð²¹¶¡³ÌÐòÒÆÖ²µ½openSUSE Tumbleweed½ÓÄÉÕ¾¡£¡£¡£


Ç徲ͨ¸æµØµãÈçÏ£º


https://www.suse.com/support/kb/doc/?id=7022512
 
2£©CVE-2017-5754²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5754/

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



4£©CVE-2017-5753²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5753/
 
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



5£©CVE-2017-5715²¹¶¡Á´½Ó


https://www.suse.com/security/cve/CVE-2017-5715/
 
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø



4. Ubuntu


1£©Ç徲ͨ¸æ


https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown


2£©²¹¶¡ÍýÏë


ÍýÏë1ÔÂ9ÈÕÐû²¼Äں˲¹¶¡£¬£¬£¬£¬°æ±¾ºÅÈçÏ£º
ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø





5. Fedora


Çå¾²¸üÐÂ


Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º


https://bodhi.fedoraproject.org/updates/kernel-4.14.11-300.fc27
 


6. Debian


1£©Çå¾²¸üÐÂ


Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º£º


https://www.debian.org/security/2018/dsa-4078


https://security-tracker.debian.org/tracker/CVE-2017-5754
 
2£©²¹¶¡°ü

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø




7. macOS/IOS


Çå¾²¸üÐÂ


Æ»¹ûÔÚ12ÔÂ6ÈÕÐû²¼µÄ macOS 10.13.2ÒÔ¼°Îª¾ÉÏµÍ³ÍÆ³öµÄÇå¾²¸üУ¬£¬£¬£¬ÒѰüÀ¨¡°Meltdown¡±Îó²îÐÞ²¹¡£¡£¡£1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£º
 


8. VMware


1£©Ç徲ͨ¸æ


VMwareÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º


https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html


2£©²¹¶¡Á´½Ó


ÏêϸµÄ²¹¶¡ÇéÐÎÈçÏ£º

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø




9. Xen


Ç徲ͨ¸æ


XenÒѾ­Ðû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º


https://xenbits.xen.org/xsa/advisory-254.html




10. Amonzon


Ç徲ͨ¸æ


Amazon·½ÃæÒѾ­Ðû²¼Ò»ÏîÇ徲ͨ¸æ£¬£¬£¬£¬Ö¸³ö£º´ËÏîÇå¾²Îó²îÆÕ±é±£´æÓÚÒÑÍù20ÄêÍÆ³öµÄÓ¢ÌØ¶û¡¢AMDÒÔ¼°ARMµÈÖÖÖÖÏÖ´ú´¦Öóͷ£Æ÷¼Ü¹¹µ±ÖУ¬£¬£¬£¬Ó°Ïì¹æÄ£º­¸ÇЧÀÍÆ÷¡¢Ì¨Ê½»úÒÔ¼°Òƶ¯×°±¸¡£¡£¡£Amazon EC2ϵͳÖгýÉÙÉÙÊýÊµÆÆÀý£¬£¬£¬£¬ÆäÓà½ÔÊܵ½ÑϿᱣ»£»£»¤¡£¡£¡£Ê£Óಿ·ÖµÄÐÞ¸´ÊÂÇ齫ÔÚ½ÓÏÂÀ´ÊýСʱÄÚÍê³É£¬£¬£¬£¬²¢¸½ÓÐÏà¹ØÊµÀýά»¤Í¨Öª¡£¡£¡£ËäÈ»AWSËùÖ´ÐеĸüÐÂÄܹ»ÇÐʵ±£»£»£»¤µ×²ã»ù´¡ÉèÊ©£¬£¬£¬£¬µ«ÎªÁ˳ä·Ö½â¾ö´Ë´ÎÎÊÌ⣬£¬£¬£¬¿Í»§»¹Ó¦¶ÔʵÀýÖеIJÙ×÷ϵͳ¾ÙÐÐÐÞ¸´¡£¡£¡£ÏÖÔÚAmazon Linux¸üÐÂÒѾ­×îÏÈÐû²¼£¬£¬£¬£¬ÏêϸÈçÏ£º


https://aws.amazon.com/security/security-bulletins/AWS-2018-013/




11. ChromeOS


Ç徲ͨ¸æ


https://support.google.com/faqs/answer/7622138#chromeos
 


12. °²×¿


Ç徲ͨ¸æ


AndroidÍŶÓÓÚ2018Äê1Ô¸üÐÂÁËÇ徲ͨ¸æ£ºCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754ΪÒѾ­»ñµÃ¹ûÕæÅû¶µÄһϵÁÐÓë´¦Öóͷ£Æ÷ÄÚÍÆ²âÖ´ÐÐÏà¹ØµÄÎó²î¡£¡£¡£AndroidÉÐδ·¢Ã÷ÈκÎÔÚ»ùÓÚARMµÄAndroid×°±¸Ö®ÉÏÖØÏÖÉÏÊöÎó²îÒÔ¾ÙÐеÄδÊÚȨÐÅϢй¶ÐÐΪ¡£¡£¡£ÎªÁËÌá¹©ÌØÁíÍâ±£»£»£»¤²½·¥£¬£¬£¬£¬±¾Í¨¸æµ±ÖаüÀ¨µÄCVE-2017-13218¸üÐÂïÔÌ­Á˶Ը߾«¶È׼ʱÆ÷µÄ»á¼û£¬£¬£¬£¬Ö¼ÔÚÏÞÖÆÅÔ·¹¥»÷£¨ÀýÈçCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754£©ËùÓÐÒÑÖª±äÖÖ¶ÔARM´¦Öóͷ£Æ÷µÄÓ°Ïì¡£¡£¡£ÏêϸÈçÏ£º


https://source.android.com/security/bulletin/2018-01-01
 


Ó¦ÓÃ




1. IE/Edge


1£©Ç徲ͨ¸æ


΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
 
2£©²¹¶¡Á´½Ó


Internet Explorer 9-11²¹¶¡ºÅkb4056568£¬£¬£¬£¬


ÏÂÔØµØµã:


http://www.catalog.update.microsoft.com/search.aspx?q=kb4056568
 
3£©Edge²¹¶¡ÏÂÔØµØµã:


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056893


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056888


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056890


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056891


http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892
 


2. Mozilla


1£©Ç徲ͨ¸æ


Firefox 57.0.4ÐÞÕý°æ±¾ÐÞ¸´ÁËÖøÃûµÄÁ½¸öÓ¢ÌØ¶ûCPUÎó²î´øÀ´µÄÇå¾²ÐÔÎÊÌ⣬£¬£¬£¬ÍƼöËùÓÐ57°æ±¾Óû§ÊµÊ±Éý¼¶¡£¡£¡£Í¨¸æÈçÏ£º
https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
 
2£©²¹¶¡Á´½Ó


²¹¶¡ÏÂÔØµØµã£º


https://download-installer.cdn.mozilla.net/pub/firefox/releases/57.0.4/
 


3. Safari


Çå¾²¸üÐÂ


1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£¬£¬£¬£¬ÈçÐèÏàʶ¸üеÄÇå¾²ÐÔÄÚÈÝ£¬£¬£¬£¬Çë»á¼û´ËÍøÕ¾£º


https://support.apple.com/zh-cn/HT201222
 


4. SQLserver


1£©Ç徲ͨ¸æ
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities


2£©²¹¶¡Á´½Ó£º


SQL Server 2016 SP1²¹¶¡ÏÂÔØµØµã£º


https://www.microsoft.com/en-us/download/details.aspx?id=54613