MeltdownºÍSpectreÎó²îÇ徲ͨ¸æ¼°²¹¶¡´óÈ«
Ðû²¼Ê±¼ä 2018-01-09MeltdownÎó²îÓ°ÏìÏÕЩËùÓеÄIntel CPUºÍ²¿·ÖARM CPU£¬£¬£¬£¬£¬£¬£¬¶øSpectreÔòÓ°ÏìËùÓеÄIntel CPUºÍAMD CPU£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ö÷Á÷µÄARM CPU¡£¡£¡£Á½×éÎó²îÓ°ÏìµÄ²Ù×÷ϵͳº¸ÇÏÖÔÚÏÕЩËùÓÐÅÌËã×°±¸¡£¡£¡£°üÀ¨Windows£¬£¬£¬£¬£¬£¬£¬Android£¬£¬£¬£¬£¬£¬£¬MacOS £¬£¬£¬£¬£¬£¬£¬IOS£¬£¬£¬£¬£¬£¬£¬Linux£¨Red hat/Debian/Ubuntu/Suse£©µÈ¡£¡£¡£ÎªÁËÇå¾²Æð¼û£¬£¬£¬£¬£¬£¬£¬ÊÐÃæÉÏËùÓеÄЧÀÍÆ÷¡¢Ð¡ÎÒ˽¼ÒµçÄÔ¡¢ÊÖ»úµÈ¶¼ÐèÒªÉý¼¶Ó¦¶Ô¡£¡£¡£µ«Í¬Ê±Ò²Òª¿´µ½Õâ¸öÎó²îʹÓÃÓÐÒ»¶¨µÄÃż÷£¬£¬£¬£¬£¬£¬£¬×ÝȻʹÓÃÀֳɣ¬£¬£¬£¬£¬£¬£¬Ò²Ö»ÄÜÈù¥»÷ÕßÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²»¿ÉÌáȨºÍ¿ØÖÆÖ÷»ú¡£¡£¡£ÓÄÁéÎó²î¶Ô¶à×⻧ϵÄÔÆÐ§ÀÍϵͳӰÏì½ÏÁ¿´ó£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÔÆÆ½Ì¨Í¨¹ýÍâµØµÄͨË׵Ļá¼ûȨÏ޾ͿÉÒÔ¶ÁÈ¡ÔÆÆ½Ì¨µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Îª½øÒ»²½»ñµÃ¸ü¸ßµÄȨÏ޺ͻñµÃÉñÃØÊý¾ÝÌṩÁË¿ÉÄÜ¡£¡£¡£ÁíÍâ˼Á¿µ½Éý¼¶ÁËCPUºÍ²Ù×÷ϵͳ֮ºóÅãͬµÄÐÔÄÜϽµ£¬£¬£¬£¬£¬£¬£¬²î±ðÓû§¿ÉÒÔÆÀ¹À×Ô¼ºµÄÇéÐÎÀ´×ö³ö¾öÒé¡£¡£¡£½¨ÒéСÎÒ˽¼ÒÓû§Ö÷ÒªÉý¼¶²Ù×÷ϵͳ²¹¶¡¼°ä¯ÀÀÆ÷°æ±¾¡£¡£¡£
Õë¶ÔÕâÁ½×éÎó²î£¬£¬£¬£¬£¬£¬£¬¸÷¼ÒоƬ³§ÉÌ£¬£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ³§ÉÌ£¬£¬£¬£¬£¬£¬£¬ä¯ÀÀÆ÷³§ÉÌ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÔÆÐ§Àͳ§ÉÌ£¬£¬£¬£¬£¬£¬£¬¶¼Æð¾¢½ÓÄɲ½·¥£¬£¬£¬£¬£¬£¬£¬Ðû²¼Ç徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬²¢ÊµÊ±ÍƳö»º½â²½·¥ºÍÐÞ¸´²¹¶¡¡£¡£¡£¼øÓÚ´ËÁ½×éÎó²îÓ°ÏìÃæÖØ´ó£¬£¬£¬£¬£¬£¬£¬²éÕÒ¸÷¸ö³§É̵ÄÇ徲ͨ¸æºÍ²úÆ·²¹¶¡ÏÂÔØµØµãÏ൱·±Ëö£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøÌì¾µÎó²îÑо¿ÍŶÓÌØÎªÄúÖªÐÄÕûÀíÏà¹ØÐÅÏ¢ÈçÏ£º
£¨ÍøÂçÐÅÏ¢×èÖ¹µ½2018Äê1ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬¸÷³§É̽«¼ÌÐøÍÆ³öÇå¾²¸üкͲ¹¶¡ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÍòÀû¹ú¼Ê¹ÙÍøÌì¾µÎó²îÑо¿ÍŶӻá¼ÌÐø¼á³ÖÇ×½ü¹Ø×¢£¬£¬£¬£¬£¬£¬£¬Ò»Á¬¸üб¾Îĵµ£¬£¬£¬£¬£¬£¬£¬¿í´ó¿Í»§¿É´ÓÍòÀû¹ú¼Ê¹ÙÍø¹ÙÍø»ñÈ¡www.venustech.com.cn£©
1. Intel
IntelÒѾȷÈÏ1995ÄêÒÔºóÉú²úµÄËùÓд¦Öóͷ£Æ÷оƬÖб£´æÏà¹ØÎÊÌ⣬£¬£¬£¬£¬£¬£¬½«ÌṩÈí¼þºÍ¹Ì¼þ¸üÐÂÒÔ½â¾öÕâЩÎó²î¡£¡£¡£°üÀ¨£º


IntelµÄÇ徲ͨ¸æÈçÏ£º
Ç徲ͨ¸æ
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/
https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html
2. AR
ARMÈ·Èϴ󲿷ִ¦Öóͷ£Æ÷²»ÊÜÎó²îÓ°Ï죬£¬£¬£¬£¬£¬£¬µ«¸ø³öÁËÒ»¸öÊÜÓ°ÏìµÄ´¦Öóͷ£Æ÷ÁÐ±í¡£¡£¡£

1)Ç徲ͨ¸æ
https://developer.arm.com/support/security-update
2)²¹¶¡Á´½Ó
Õë¶ÔlinuxÉϵijÌÐò£¬£¬£¬£¬£¬£¬£¬ARMÌṩÁËбàÒëÆ÷£¬£¬£¬£¬£¬£¬£¬¿ÉÓÃбàÒëÖØÊÓбàÒë¡£¡£¡£ÁíÍâÐû²¼ÁËLinux ARMÄں˲¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÐÞ²¹Îó²î£º
https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti
3. AMD
Ç徲ͨ¸æ
AMDÕë¶Ôÿ¸öÎó²î×öÁ˻ظ´£¬£¬£¬£¬£¬£¬£¬µÚÒ»¸öÎó²îÓÉÈí¼þ¡¢²Ù×÷ϵͳ³§ÉÌÐû²¼²¹¶¡½â¾ö£¬£¬£¬£¬£¬£¬£¬ÐÔÄÜÓ°ÏìºÜÊÇÉÔ΢£¬£¬£¬£¬£¬£¬£¬ÆäËûÁ½¸öÎó²îÓÉÓÚAMD CPUÌØÊâµÄ¼Ü¹¹£¬£¬£¬£¬£¬£¬£¬¶¼²»ÊÜÓ°Ïì¡£¡£¡£ÏêϸÈçÏ£º
https://www.amd.com/en/corporate/speculative-execution
4. Nvidia
1)Ç徲ͨ¸æ
NvidiaÒѾÐû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º
https://www.nvidia.com/en-us/product-security/
2)²¹¶¡Á´½Ó
ÏêϸµÄ²¹¶¡Á´½ÓÈçÏ£º

1. Windows
1£©Ç徲ͨ¸æ
΢ÈíÒѾÐû²¼ÁËÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËIE¡¢Edge¡¢WindowsÄÚºËÖÐÏà¹ØÎÊÌâ¡£¡£¡£
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
2£©WindowsÊÜÓ°Ïì²úÆ·°üÀ¨£º
1. Windows 10
2. Windows 8
3. Windows 8.1
4. Windows 7
5. Windows Vista
6. Windows XP
7. Windows Server 2003
8. Windows Server 2008
9. Windows Server 2012
10. Windows Server 2012 R2
3£©²¹¶¡Á´½Ó

2. Linux
LinuxÄں˿ª·¢ÕßThomas GleixnerÔÚ2017Äê12ÔÂÔÚLinuxÄÚºËÓʼþÁбíÖоÍеÄKAISER¸ôÀë²¹¶¡Ðû²¼ÁË˵Ã÷¡£¡£¡£ÏÖÔÚÓÐÈËÏÓÒÉÕâÅú²¹¶¡¿ÉÄÜÕýÊÇΪÏàʶ¾öLinuxϵͳµ±ÖеÄMetldownÓëSpectre Îó²î¡£¡£¡£ÏêϸÈçÏ£º
https://lkml.org/lkml/2017/12/4/709
3. RedHat
1£©Ç徲ͨ¸æ
ºìñ¹«Ë¾ÒѾÐû²¼Ò»ÏÒ飬£¬£¬£¬£¬£¬£¬ÆäÖÐÁгöÊܵ½Ó°ÏìµÄ²úÆ·¼°ÆäÄ¿½ñ״̬¡£¡£¡£½¨ÒéÄÚÈÝÅú×¢£º¹ØÓÚÕýÔÚÔËÐÐÊÜÓ°Ïì°æ±¾²úÆ·µÄºìñ¿Í»§£¬£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéÓû§¾¡¿ìƾָ֤µ¼Çåµ¥¾ÙÐиüС£¡£¡£ËùÓÐÊÜÓ°Ïì²úÆ·¶¼Ó¦×°ÖÃÐÞ¸´²¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬£¬½èÒÔ»º½âCVE-2017-5753 (±äÖÖ1)Óë CVE-2017-5754 (±äÖÖ3)Îó²î¡£¡£¡£CVE-2017-5715 (±äÖÖ2)¿Éͨ¹ýÍâµØÒÔ¼°ÐéÄâ·Ã¿Í½çÏßÁ½ÖÖ·½·¨±»¼ÓÒÔʹÓᣡ£¡£ÏêϸÈçÏ£º
https://access.redhat.com/security/vulnerabilities/speculativeexecution
2£©²¹¶¡Á´½Ó









1£©Ç徲ͨ¸æ
SUSE¾ÍSLE Óë openSUSEÓ¦¶ÔMeltdown ºÍ Spectre CPUÎó²îÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬SUSE Enterprise Linux£¨SLE£©ºÍOpenSuSE£¨Leap and Tumbleweed£©Ò²Êܵ½ÕâЩÑÏÖØµÄÓ²¼þ¹ýʧµÄÓ°Ï죬£¬£¬£¬£¬£¬£¬ÕâЩ¹ýʧ¿ÉÄÜ»áʹ·ÇÌØÈ¨µÄ¹¥»÷ÕßʹÓöñÒâÓ¦ÓóÌÐò´ÓÄÚºËÄÚ´æÖÐÇÔÈ¡Ãô¸ÐÊý¾Ý ¡£¡£¡£openSUSE Leap 42.2ºÍopenSUSE Leap 42.3Óû§¼´½«ÊÕµ½ÓëSUSE Linux Enterprise 12ÏàͬµÄÄں˸üС£¡£¡£ÁíÒ»·½Ã棬£¬£¬£¬£¬£¬£¬openSUSE¿ª·¢Ö°Ô±ÏÖÔÚÕýÔÚ½«Ð²¹¶¡³ÌÐòÒÆÖ²µ½openSUSE Tumbleweed½ÓÄÉÕ¾¡£¡£¡£
Ç徲ͨ¸æµØµãÈçÏ£º
https://www.suse.com/support/kb/doc/?id=7022512
2£©CVE-2017-5754²¹¶¡Á´½Ó
https://www.suse.com/security/cve/CVE-2017-5754/







































4£©CVE-2017-5753²¹¶¡Á´½Ó
https://www.suse.com/security/cve/CVE-2017-5753/






















5£©CVE-2017-5715²¹¶¡Á´½Ó
https://www.suse.com/security/cve/CVE-2017-5715/

























4. Ubuntu
1£©Ç徲ͨ¸æ
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
2£©²¹¶¡ÍýÏë
ÍýÏë1ÔÂ9ÈÕÐû²¼Äں˲¹¶¡£¡£¡£¬£¬£¬£¬£¬£¬£¬°æ±¾ºÅÈçÏ£º

5. Fedora
Çå¾²¸üÐÂ
Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬£¬£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º
https://bodhi.fedoraproject.org/updates/kernel-4.14.11-300.fc27
6. Debian
1£©Çå¾²¸üÐÂ
Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬°üÀ¨¶ÔCVE-2017-5754 (Meltdown)µÄÐÞ²¹£¬£¬£¬£¬£¬£¬£¬CVE-2017-5753ºÍCVE-2017-5715£¨Spectre£©µÄ²¹¶¡ºóÐø»áÍÆ³ö£º£º
https://www.debian.org/security/2018/dsa-4078
https://security-tracker.debian.org/tracker/CVE-2017-5754
2£©²¹¶¡°ü

7. macOS/IOS
Çå¾²¸üÐÂ
Æ»¹ûÔÚ12ÔÂ6ÈÕÐû²¼µÄ macOS 10.13.2ÒÔ¼°Îª¾ÉÏµÍ³ÍÆ³öµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒѰüÀ¨¡°Meltdown¡±Îó²îÐÞ²¹¡£¡£¡£1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£º
8. VMware
1£©Ç徲ͨ¸æ
VMwareÒѾÐû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
2£©²¹¶¡Á´½Ó
ÏêϸµÄ²¹¶¡ÇéÐÎÈçÏ£º

9. Xen
Ç徲ͨ¸æ
XenÒѾÐû²¼ÁËÇ徲ͨ¸æ,ÍÆ¼öÓйصÄÇý¶¯³ÌÐò»òÈí¼þ°ü¸üиøÓèÖ¸µ¼¡£¡£¡£Í¨¸æÈçÏ£º
https://xenbits.xen.org/xsa/advisory-254.html
10. Amonzon
Ç徲ͨ¸æ
Amazon·½ÃæÒѾÐû²¼Ò»ÏîÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬Ö¸³ö£º´ËÏîÇå¾²Îó²îÆÕ±é±£´æÓÚÒÑÍù20ÄêÍÆ³öµÄÓ¢ÌØ¶û¡¢AMDÒÔ¼°ARMµÈÖÖÖÖÏÖ´ú´¦Öóͷ£Æ÷¼Ü¹¹µ±ÖУ¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º¸ÇЧÀÍÆ÷¡¢Ì¨Ê½»úÒÔ¼°Òƶ¯×°±¸¡£¡£¡£Amazon EC2ϵͳÖгýÉÙÉÙÊýÊµÆÆÀý£¬£¬£¬£¬£¬£¬£¬ÆäÓà½ÔÊܵ½ÑϿᱣ»£»£»£»£»¤¡£¡£¡£Ê£Óಿ·ÖµÄÐÞ¸´ÊÂÇ齫ÔÚ½ÓÏÂÀ´ÊýСʱÄÚÍê³É£¬£¬£¬£¬£¬£¬£¬²¢¸½ÓÐÏà¹ØÊµÀýά»¤Í¨Öª¡£¡£¡£ËäÈ»AWSËùÖ´ÐеĸüÐÂÄܹ»ÇÐʵ±£»£»£»£»£»¤µ×²ã»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬µ«ÎªÁ˳ä·Ö½â¾ö´Ë´ÎÎÊÌ⣬£¬£¬£¬£¬£¬£¬¿Í»§»¹Ó¦¶ÔʵÀýÖеIJÙ×÷ϵͳ¾ÙÐÐÐÞ¸´¡£¡£¡£ÏÖÔÚAmazon Linux¸üÐÂÒѾ×îÏÈÐû²¼£¬£¬£¬£¬£¬£¬£¬ÏêϸÈçÏ£º
https://aws.amazon.com/security/security-bulletins/AWS-2018-013/
11. ChromeOS
Ç徲ͨ¸æ
https://support.google.com/faqs/answer/7622138#chromeos
12. °²×¿
Ç徲ͨ¸æ
AndroidÍŶÓÓÚ2018Äê1Ô¸üÐÂÁËÇ徲ͨ¸æ£ºCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754ΪÒѾ»ñµÃ¹ûÕæÅû¶µÄһϵÁÐÓë´¦Öóͷ£Æ÷ÄÚÍÆ²âÖ´ÐÐÏà¹ØµÄÎó²î¡£¡£¡£AndroidÉÐδ·¢Ã÷ÈκÎÔÚ»ùÓÚARMµÄAndroid×°±¸Ö®ÉÏÖØÏÖÉÏÊöÎó²îÒÔ¾ÙÐеÄδÊÚȨÐÅϢй¶ÐÐΪ¡£¡£¡£ÎªÁËÌá¹©ÌØÁíÍâ±£»£»£»£»£»¤²½·¥£¬£¬£¬£¬£¬£¬£¬±¾Í¨¸æµ±ÖаüÀ¨µÄCVE-2017-13218¸üÐÂïÔÌÁ˶Ը߾«¶È׼ʱÆ÷µÄ»á¼û£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÏÞÖÆÅÔ·¹¥»÷£¨ÀýÈçCVE-2017-5715¡¢CVE-2017-5753ÒÔ¼°CVE-2017-5754£©ËùÓÐÒÑÖª±äÖÖ¶ÔARM´¦Öóͷ£Æ÷µÄÓ°Ïì¡£¡£¡£ÏêϸÈçÏ£º
https://source.android.com/security/bulletin/2018-01-01
1. IE/Edge
1£©Ç徲ͨ¸æ
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
2£©²¹¶¡Á´½Ó
Internet Explorer 9-11²¹¶¡ºÅkb4056568£¬£¬£¬£¬£¬£¬£¬
ÏÂÔØµØµã:
http://www.catalog.update.microsoft.com/search.aspx?q=kb4056568
3£©Edge²¹¶¡ÏÂÔØµØµã:
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056893
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056888
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056890
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056891
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892
2. Mozilla
1£©Ç徲ͨ¸æ
Firefox 57.0.4ÐÞÕý°æ±¾ÐÞ¸´ÁËÖøÃûµÄÁ½¸öÓ¢ÌØ¶ûCPUÎó²î´øÀ´µÄÇå¾²ÐÔÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÍƼöËùÓÐ57°æ±¾Óû§ÊµÊ±Éý¼¶¡£¡£¡£Í¨¸æÈçÏ£º
https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/
2£©²¹¶¡Á´½Ó
²¹¶¡ÏÂÔØµØµã£º
https://download-installer.cdn.mozilla.net/pub/firefox/releases/57.0.4/
3. Safari
Çå¾²¸üÐÂ
1ÔÂ8ÈÕÆ»¹û¹«Ë¾Ðû²¼iOS 11.2.2Õýʽ°æ¸üУ¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÐÞ¸´ÁË Safari ä¯ÀÀÆ÷µÄ Spectre Çå¾²Îó²î£¨CVE-2017-5753 and CVE-2017-5715£©£¬£¬£¬£¬£¬£¬£¬ÈçÐèÏàʶ¸üеÄÇå¾²ÐÔÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬Çë»á¼û´ËÍøÕ¾£º
https://support.apple.com/zh-cn/HT201222
4. SQLserver
1£©Ç徲ͨ¸æ
΢ÈíÇ徲ͨ¸æ£º
https://support.microsoft.com/en-us/help/4073235/cloud-protections-speculative-execution-side-channel-vulnerabilities
2£©²¹¶¡Á´½Ó£º
SQL Server 2016 SP1²¹¶¡ÏÂÔØµØµã£º
https://www.microsoft.com/en-us/download/details.aspx?id=54613


¾©¹«Íø°²±¸11010802024551ºÅ