Intel CPU΢¼Ü¹¹Êý¾Ý²ÉÑù(MDS)Îó²î
Ðû²¼Ê±¼ä 2019-05-15
Åä¾°ÐÎò
Îó²îÁбí
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹´æ´¢»º³åÇøÊý¾Ý²ÉÑù£¨MSBDS£©£¬£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªFallout¹¥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2018-12127
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹¸ºÔض˿ÚÊý¾Ý²ÉÑù£¨MLPDS£©£¬£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªZombieload»òRIDL¹¥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2018-12130
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹Ìî³ä»º³åÇøÊý¾Ý²ÉÑù£¨MFBDS£©£¬£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2019-11091
Îó²îÆ·¼¶£º µÍΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹²»¿É»º´æÄÚ´æÊý¾Ý²ÉÑù£¨MDSUM£©£¬£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º 3.8
Îó²îÏêÇé
ͨ¹ýʹÓÃIntel CPU΢¼Ü¹¹ÖеÄÍÆ²âÖ´ÐвÙ×÷£¬£¬£¬£¬£¬£¬£¬MDS¹¥»÷¿ÉÔÊÐí¹¥»÷Õß»á¼ûÆäËü³ÌÐòÔÚCPUÖд¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£¡£×Ô2011ÄêÒÔÀ´µÄIntel CPUÏÕЩ¶¼ÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬°üÀ¨Ì¨Ê½»ú¡¢Ìõ¼Ç±¾¼°Ð§ÀÍÆ÷µÄ´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£IntelÌåÏÖÆä×îвúÆ·¿É´ÓÓ²¼þ²ãÃæ½â¾öÕâЩÎÊÌ⣬£¬£¬£¬£¬£¬£¬°üÀ¨µÚ8´úºÍµÚ9´úCore´¦Öóͷ£Æ÷¼°µÚ¶þ´úXeon Scalable´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£¹ØÓÚÆäËûÊÜÓ°ÏìµÄ²úÆ·£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ý΢´úÂë¸üлñµÃ»º½â¡£¡£¡£¡£¡£¡£
Ó¢ÌØ¶û»¹ÌåÏÖ¶Ô´ó´ó¶¼PC¶øÑÔ£¬£¬£¬£¬£¬£¬£¬»º½â²½·¥¶ÔÐÔÄÜÓ°Ïì²»´ó£¬£¬£¬£¬£¬£¬£¬µ«¶ÔÊý¾ÝÖÐÐĸºÔضøÑÔ£¬£¬£¬£¬£¬£¬£¬ÐÔÄÜ¿ÉÄܱ£´æÏ½µ¡£¡£¡£¡£¡£¡£
ARMºÍAMD´¦Öóͷ£Æ÷ËÆºõûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£
ÊÜÓ°Ïì²úÆ·µÄÍêÕûÁбí¿É²Î¿¼ÒÔÏÂÎļþ£º
https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
ÐÞ¸´½¨Òé
MicrosoftÒÑÐû²¼²Ù×÷ϵͳ¼¶¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔ½â¾öËĸöMDSÎó²î¡£¡£¡£¡£¡£¡£Æ¾Ö¤MicrosoftµÄMDSÇå¾²½¨Ò飬£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¸üпÉÓÃÓÚWindowsºÍWindows Server£¬£¬£¬£¬£¬£¬£¬Ò²¿ÉÓÃÓÚSQL ServerÊý¾Ý¿â¡£¡£¡£¡£¡£¡£Azure¿Í»§¶ËÒÑÊܵ½±£»£»£»£»¤£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚMicrosoftÒѽÓÄɲ½·¥ÐÞ²¹ÆäÔÆ»ù´¡¼Ü¹¹²¢¼õÇáÍþв¡£¡£¡£¡£¡£¡£
Apple
Æ»¹û½ñÌìÐû²¼µÄmacOS Mojave 10.14.5ÒѾ°²ÅÅÁ˶ÔMDS¹¥»÷µÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£iOS×°±¸²»Ò×Êܵ½MDS¹¥»÷£¬£¬£¬£¬£¬£¬£¬Òò´ËÏÖÔÚ²»ÐèÒªÌØÊâµÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£
Linux
Ë鯬»¯µÄLINUXÉú̬ϵͳÐû²¼²¹¶¡µÄËÙÂÊ»ºÂý¡£¡£¡£¡£¡£¡£ÔÚ׫д±¾ÎÄʱ£¬£¬£¬£¬£¬£¬£¬Ö»ÓÐRed HatºÍUbuntuÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£
¹È¸è½ñÌìÐû²¼ÁËÒ»¸ö×ÊÖúÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬ÁгöÁËÿÖÖ²úÆ·µÄ״̬ÒÔ¼°ËüÔõÑùÊܵ½DS¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£Æ¾Ö¤´ËÒ³Ãæ£¬£¬£¬£¬£¬£¬£¬¹È¸èµÄÔÆ»ù´¡¼Ü¹¹ÒѾ»ñµÃÁËÊʵ±µÄ±£»£»£»£»¤¡£¡£¡£¡£¡£¡£Ä³Ð©Google Cloud Platform¿Í»§¿ÉÄÜÐèÒªÉó²éijЩÉèÖ㬣¬£¬£¬£¬£¬£¬µ«G SuiteºÍGoogle Apps¿Í»§ÎÞÐèÖ´ÐÐÈκβÙ×÷¡£¡£¡£¡£¡£¡£Chrome²Ù×÷ϵͳÒÑÍ£ÓÃChrome OS 74¼°ºóÐø°æ±¾µÄ³¬Ï̹߳¦Ð§¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Õâ¿ÉÒÔ±ÜÃâMDS¹¥»÷¡£¡£¡£¡£¡£¡£AndroidÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¼¶±ðµÄ»º½â²½·¥Ó¦Äܱ£»£»£»£»¤Chromeä¯ÀÀÆ÷Óû§¡£¡£¡£¡£¡£¡£
Amazon
ÀàËÆÓڹȸèºÍ΢Èí£¬£¬£¬£¬£¬£¬£¬ÑÇÂíÑ·ÌåÏÖÒѾÔÚÔÆÐ§ÀÍÆ÷ÉÏÐÞ²¹²¢Ó¦Óûº½â²½·¥¡£¡£¡£¡£¡£¡£
²Î¿¼Á´½Ó
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/