Intel CPU΢¼Ü¹¹Êý¾Ý²ÉÑù(MDS)Îó²î
Ðû²¼Ê±¼ä 2019-05-15
Åä¾°ÐÎò
Îó²îÁбí
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹´æ´¢»º³åÇøÊý¾Ý²ÉÑù£¨MSBDS£©£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªFallout¹¥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2018-12127
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹¸ºÔض˿ÚÊý¾Ý²ÉÑù£¨MLPDS£©£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªZombieload»òRIDL¹¥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2018-12130
Îó²îÆ·¼¶£º ÖÐΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹Ìî³ä»º³åÇøÊý¾Ý²ÉÑù£¨MFBDS£©£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º 6.5
CVE ID £º CVE-2019-11091
Îó²îÆ·¼¶£º µÍΣ
Îó²îÃû³Æ£º ΢¼Ü¹¹²»¿É»º´æÄÚ´æÊý¾Ý²ÉÑù£¨MDSUM£©£¬£¬£¬£¬£¬£¬RIDLÀ๥»÷
CVSSÆÀ·Ö£º 3.8
Îó²îÏêÇé
ͨ¹ýʹÓÃIntel CPU΢¼Ü¹¹ÖеÄÍÆ²âÖ´ÐвÙ×÷£¬£¬£¬£¬£¬£¬MDS¹¥»÷¿ÉÔÊÐí¹¥»÷Õß»á¼ûÆäËü³ÌÐòÔÚCPUÖд¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£×Ô2011ÄêÒÔÀ´µÄIntel CPUÏÕЩ¶¼ÊÜÓ°Ï죬£¬£¬£¬£¬£¬°üÀ¨Ì¨Ê½»ú¡¢Ìõ¼Ç±¾¼°Ð§ÀÍÆ÷µÄ´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£¡£¡£IntelÌåÏÖÆä×îвúÆ·¿É´ÓÓ²¼þ²ãÃæ½â¾öÕâЩÎÊÌ⣬£¬£¬£¬£¬£¬°üÀ¨µÚ8´úºÍµÚ9´úCore´¦Öóͷ£Æ÷¼°µÚ¶þ´úXeon Scalable´¦Öóͷ£Æ÷¡£¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÆäËûÊÜÓ°ÏìµÄ²úÆ·£¬£¬£¬£¬£¬£¬¿Éͨ¹ý΢´úÂë¸üлñµÃ»º½â¡£¡£¡£¡£¡£¡£¡£¡£
Ó¢ÌØ¶û»¹ÌåÏÖ¶Ô´ó´ó¶¼PC¶øÑÔ£¬£¬£¬£¬£¬£¬»º½â²½·¥¶ÔÐÔÄÜÓ°Ïì²»´ó£¬£¬£¬£¬£¬£¬µ«¶ÔÊý¾ÝÖÐÐĸºÔضøÑÔ£¬£¬£¬£¬£¬£¬ÐÔÄÜ¿ÉÄܱ£´æÏ½µ¡£¡£¡£¡£¡£¡£¡£¡£
ARMºÍAMD´¦Öóͷ£Æ÷ËÆºõûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£¡£
ÊÜÓ°Ïì²úÆ·µÄÍêÕûÁбí¿É²Î¿¼ÒÔÏÂÎļþ£º
https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
ÐÞ¸´½¨Òé
MicrosoftÒÑÐû²¼²Ù×÷ϵͳ¼¶¸üУ¬£¬£¬£¬£¬£¬ÒÔ½â¾öËĸöMDSÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤MicrosoftµÄMDSÇå¾²½¨Ò飬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¸üпÉÓÃÓÚWindowsºÍWindows Server£¬£¬£¬£¬£¬£¬Ò²¿ÉÓÃÓÚSQL ServerÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£¡£Azure¿Í»§¶ËÒÑÊܵ½±£»£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬ÓÉÓÚMicrosoftÒѽÓÄɲ½·¥ÐÞ²¹ÆäÔÆ»ù´¡¼Ü¹¹²¢¼õÇáÍþв¡£¡£¡£¡£¡£¡£¡£¡£
Apple
Æ»¹û½ñÌìÐû²¼µÄmacOS Mojave 10.14.5ÒѾ°²ÅÅÁ˶ÔMDS¹¥»÷µÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£¡£¡£iOS×°±¸²»Ò×Êܵ½MDS¹¥»÷£¬£¬£¬£¬£¬£¬Òò´ËÏÖÔÚ²»ÐèÒªÌØÊâµÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£¡£¡£
Linux
Ë鯬»¯µÄLINUXÉú̬ϵͳÐû²¼²¹¶¡µÄËÙÂÊ»ºÂý¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ׫д±¾ÎÄʱ£¬£¬£¬£¬£¬£¬Ö»ÓÐRed HatºÍUbuntuÐû²¼ÁËÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£
¹È¸è½ñÌìÐû²¼ÁËÒ»¸ö×ÊÖúÒ³Ãæ£¬£¬£¬£¬£¬£¬ÁгöÁËÿÖÖ²úÆ·µÄ״̬ÒÔ¼°ËüÔõÑùÊܵ½DS¹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤´ËÒ³Ãæ£¬£¬£¬£¬£¬£¬¹È¸èµÄÔÆ»ù´¡¼Ü¹¹ÒѾ»ñµÃÁËÊʵ±µÄ±£»£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£¡£Ä³Ð©Google Cloud Platform¿Í»§¿ÉÄÜÐèÒªÉó²éijЩÉèÖ㬣¬£¬£¬£¬£¬µ«G SuiteºÍGoogle Apps¿Í»§ÎÞÐèÖ´ÐÐÈκβÙ×÷¡£¡£¡£¡£¡£¡£¡£¡£Chrome²Ù×÷ϵͳÒÑÍ£ÓÃChrome OS 74¼°ºóÐø°æ±¾µÄ³¬Ï̹߳¦Ð§¡£¡£¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬Õâ¿ÉÒÔ±ÜÃâMDS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£AndroidÓû§²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£¹È¸èÌåÏÖ£¬£¬£¬£¬£¬£¬²Ù×÷ϵͳ¼¶±ðµÄ»º½â²½·¥Ó¦Äܱ£»£»£»£»£»£»£»£»¤Chromeä¯ÀÀÆ÷Óû§¡£¡£¡£¡£¡£¡£¡£¡£
Amazon
ÀàËÆÓڹȸèºÍ΢Èí£¬£¬£¬£¬£¬£¬ÑÇÂíÑ·ÌåÏÖÒѾÔÚÔÆÐ§ÀÍÆ÷ÉÏÐÞ²¹²¢Ó¦Óûº½â²½·¥¡£¡£¡£¡£¡£¡£¡£¡£
²Î¿¼Á´½Ó
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/


¾©¹«Íø°²±¸11010802024551ºÅ