ÓÄÁéбäÖÖSWAPGS¹¥»÷Îó²îÇ徲ͨ¸æ

Ðû²¼Ê±¼ä 2019-08-07

? Îó²î±àºÅºÍ¼¶±ð


CVE±àºÅ£ºCVE-2019-1125£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬CVSS·ÖÖµ£º¹Ù·½Î´ÆÀ¶¨


Ó°Ïì°æ±¾


ÊÜÓ°ÏìµÄ°æ±¾


SWAPGS¹¥»÷»áÓ°ÏìÔËÐÐIntel Ivy Bridge»ò¸üÐÂCPUµÄÈκÎ×°±¸


Îó²î¸ÅÊö


BitdefenderÑо¿Ö°Ô±·¢Ã÷CPUÓÄÁéÎó²îµÄбäÖÖ-SWAPGSÎó²î£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¶ñÒâ³ÌÐò»á¼ûºÍ¶ÁȡϵͳÄÚºËÄÚ´æÖеÄÊý¾Ý¡£¡£¡£¡£¡£ ¡£SWAPGSÎó²îÊÇÒ»ÖÖÍÆ²âÐÔÖ´ÐеIJâÐŵÀÎó²î£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃ64λCPUÖеÄSWAPGSÖ¸ÁîÍ»ÆÆÄÚ´æ¸ôÀ룬£¬£¬ÔÊÐíÎÞÌØÈ¨µÄ¹¥»÷Õß»á¼ûÌØÈ¨Äں˵ÄÄÚ´æÃô¸ÐÐÅÏ¢£¬£¬£¬°üÀ¨Ì¸ÌìÐÂÎÅ¡¢µç×ÓÓʼþ¡¢µÇ¼ƾ֤¡¢Ö§¸¶ÐÅÏ¢¡¢ÃÜÂë¡¢¼ÓÃÜÃÜÔ¿¡¢ÁîÅÆºÍ»á¼ûƾ֤µÈ£¬£¬£¬ÇÒ²»»áÁô϶ÔÓ²¼þµÄ¹¥»÷ºÛ¼£¡£¡£¡£¡£¡£ ¡£


ΪÁËÌá¸ßCPUµÄÐÔÄÜ£¬£¬£¬Ò»¸ö³ÆÎªÍƲâÖ´ÐеĹ¦Ð§½«ÔÚËüÖªµÀÊÇ·ñÐèÒªËüÃÇ֮ǰִÐÐÖ¸Áî¡£¡£¡£¡£¡£ ¡£Õë¶Ô´Ë¹¦Ð§µÄÎó²î³ÆÎª²àÐŵÀ¹¥»÷¡£¡£¡£¡£¡£ ¡£Æù½ñΪֹ£¬£¬£¬×î×ÅÃûµÄÀý×ÓÊÇMeltdown£¬£¬£¬Spectre£¬£¬£¬L1TFºÍMicroarchitectural Data Sampling£¨MDS£©¡£¡£¡£¡£¡£ ¡£


½â¾öÕâЩÎó²î¼«¾ßÌôÕ½ÐÔ¡£¡£¡£¡£¡£ ¡£ÓÉÓÚËüÃÇÉîÈëµ½ÏÖ´úCPUµÄ½á¹¹ºÍ²Ù×÷ÖУ¬£¬£¬Òò´ËÍêÈ«Ïû³ýÎó²îÉæ¼°Ìæ»»Ó²¼þ»ò½ûÓÿɴó´óÌá¸ßÐÔÄܵĹ¦Ð§¡£¡£¡£¡£¡£ ¡£Í¬Ñù£¬£¬£¬½¨É軺½â»úÖÆºÜÊÇÖØ´ó£¬£¬£¬²¢ÇÒ¿ÉÄܹÊÕÏͨ¹ýÍÆ²âÖ´Ðй¦Ð§ÊµÏÖµÄÐÔÄÜÌáÉý¡£¡£¡£¡£¡£ ¡£ÀýÈ磬£¬£¬ÍêÈ«Ïû³ýÕë¶ÔÓ¢ÌØ¶ûCPUµÄÍÆ²âÖ´Ðй¦Ð§µÄÅÔµÀ¹¥»÷µÄ¿ÉÄÜÐÔ½«ÐèÒªÍêÈ«½ûÓó¬Ị̈߳¬£¬£¬Õ⽫ÑÏÖØ½µµÍÐÔÄÜ¡£¡£¡£¡£¡£ ¡£


ÕâÀàÎó²îµÄ»º½â²½·¥ÄÑÒÔʵÑé¡£¡£¡£¡£¡£ ¡£ËüÃÇͨ³£·ÖΪÈýÀࣺӲ¼þÐÞ¸´£¬£¬£¬Èí¼þ»º½â»ò΢´úÂ뻺½â¡£¡£¡£¡£¡£ ¡£ËùÓÐÏÈǰ̻¶µÄ²àͨµÀ¹¥»÷¶¼Í¨¹ýÈýÖÖÒªÁìÖеÄÖÁÉÙÒ»ÖÖÀ´¼õÇá¡£¡£¡£¡£¡£ ¡£


BitdefenderÑо¿Ö°Ô±ÐÎòÁËSWAPGS¹¥»÷¡£¡£¡£¡£¡£ ¡£ÕâÖÖ¹¥»÷ÊÇÒ»ÖÖ´ÓÄÚºË×ß©Ãô¸ÐÐÅÏ¢µÄÐÂÒªÁ죬£¬£¬ÓÉÓÚËüÈÆ¹ýÁËËùÓÐÒÑÖªµÄ²àÐŵÀ¹¥»÷»º½âÊÖÒÕ¡£¡£¡£¡£¡£ ¡£ÕâÊÇͨ¹ýÀÄÓÃSWAPGSÖ¸Áî¿ÉÒÔÍÆ²âÐÔµØÖ´ÐеÄÊÂʵÀ´ÊµÏֵġ£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉÒÔÇ¿ÖÆÄÚºËÖеÄí§ÒâÄÚ´æÉ¨³ýÒýÓ㬣¬£¬Õâ»áÔÚÊý¾Ý»º´æÖÐÁôϺۼ£¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉÒÔʰȡÕâЩÐźţ¬£¬£¬ÒÔÍÆ¶ÏλÓÚ¸ø¶¨Äں˵صãµÄÖµ¡£¡£¡£¡£¡£ ¡£


BitdefenderÒѾ­ÑÝʾÁËHypervisor IntrospectionÔõÑùͨ¹ýɾ³ýÔÚδÐÞ²¹µÄWindowsϵͳÉÏÀÖ³ÉËùÐèµÄÌõ¼þÀ´×èÖ¹¹¥»÷¡£¡£¡£¡£¡£ ¡£ÕâÖÖ»º½â²½·¥Ã»ÓÐÒýÆðÏÔ×ŵÄÐÔÄÜϽµ¡£¡£¡£¡£¡£ ¡£ËäȻǿÁÒ½¨Òé´ÓMicrosoft°²ÅŲ¹¶¡£¡£¡£¡£¡£ ¡£¬£¬£¬µ«Hypervisor Introspection¿ÉÒÔÌṩÓÐÓõÄÅâ³¥¿ØÖÆ£¬£¬£¬Ö±µ½¿ÉÒÔÐÞ²¹ÏµÍ³¡£¡£¡£¡£¡£ ¡£DEMOÑÝʾ£ºhttp://www.bitdefender.com/SWAPGSAttack¡£¡£¡£¡£¡£ ¡£


Îó²îÑéÖ¤


ÔÝÎÞPOC/EXP¡£¡£¡£¡£¡£ ¡£


ÐÞ¸´½¨Òé


΢Èí¡¢ºìñÒÔ¼°Ó¢ÌضûºÍ¹È¸èµÈ¹©Ó¦ÉÌÒѾ­Ðû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡ºÍ½¨Ò飬£¬£¬AMDÔò³ÆËûÃǵIJúÆ·²»ÊÜÓ°Ï죺


΢Èí£ºhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125


Redhat£ºhttps://access.redhat.com/articles/4329821


Ó¢ÌØ¶û£ºhttps://software.intel.com/security-software-guidance/insights/more-information-swapgs-and-speculative-only-segment-loads


¹È¸è£º


https://chromium.googlesource.com/chromiumos/third_party/kernel/+/cc4c818b2219c58af5f0ca59f3e9f02c48bc0b65/Documentation/admin-guide/hw-vuln/spectre.rst


https://android-review.googlesource.com/c/kernel/common/+/1097435


Linux kernel£ºhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?

id=18ec54fdd6d18d92025af097cd042a75cf0ea24c


²Î¿¼Á´½Ó


https://www.bleepingcomputer.com/news/security/swapgs-vulnerability-in-modern-cpus-fixed-in-windows-linux-chromeos/