接上篇《
【转】Intel安全说明:关于对应侧信道分析的事实
》
无论实际安全影响有多大,我想有些用户、系统厂商不得不更新软件了。本文整理了来自网络的一些信息,供读者朋友参考。
NVIDIA在官方网站上发布安全公告确认,NVIDIA产品不会受到Meltdown漏洞影响(因为它是Intel架构专属的),但是在另一个漏洞Spectre面前,GeForce、Quadro、NVS、Tesla、GRID全部沦陷!
其中,GeForce、Quadro、NVS系列搭配Windows、Linux、FreeBSD、Solaris系统均受影响,Tesla系列搭配Windows、Linux系统受影响,GRID搭配Windows、Windows Server Hyper-V、Linux、Citrix XenServer、VMware vSphere、Red Hat KVM受影响。
目前,NVIDIA正在为旗下产品推送新的驱动程序,其中就包含漏洞修复补丁,其中GeForce、Quadro、NVS系列的Windows新驱动版本号为390.65/386.07,Linux新驱动版本为390.12/384.111,均已经提供下载,建议更新。
下面是来自 http://nvidia.custhelp.com/app/answers/detail/a_id/4611 的声明:
Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
Answer ID 4611
Updated 01/10/2018 11:18 AM
NVIDIA driver response to CPU speculative side channel vulnerabilities - CVE-2017-5753, CVE-2017-5715, CVE-2017-5754
Bulletin Summary
NVIDIA is providing an initial security update to mitigate aspects of
Google Project Zero’s January 3, 2018 publication of novel information
disclosure attacks that combine CPU speculative execution with known
side channels.
NVIDIA's core business is GPU computing.
We believe our GPU hardware is immune to the reported security
issue. As for our driver software, we are providing updates to help
mitigate the CPU security issue.
The vulnerability has three known variants:
-
Variant 1 (CVE-2017-5753)
: CPU mitigations are provided with
the security update included in this bulletin. NVIDIA expects to work
together with its ecosystem partners on future updates to further
strengthen mitigations for affected CPUs.
-
Variant 2 (CVE-2017-5715)
: NVIDIA’s initial analysis
indicates that NVIDIA software running on affected CPUs may require
further updates. NVIDIA expects to work together with its ecosystem
partners on this variant.
-
Variant 3 (CVE-2017-5754)
: At this time, NVIDIA has no reason
to believe that NVIDIA software is vulnerable to this variant when
running on affected CPUs.
For updates and additional information, actively monitor the NVIDIA Product Security page.
https://www.nvidia.com/product-security
Vulnerability Details
The following sections summarize the vulnerabilities. Descriptions are as published on MITRE and risk assessments follow CVSS.
CVE-2017-5753
Computer systems with microprocessors utilizing speculative execution
and branch prediction may allow unauthorized disclosure of information
to an attacker with local user access via a side-channel analysis.
CVSS Base Score: 8.2
CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
CVE-2017-5715
Computer systems with microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.
CVSS Base Score: 8.2
CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
CVE-2017-5754
Computer systems with microprocessors utilizing speculative execution
may allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis of the data cache.
CVSS Base Score: 7.9
CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
NVIDIA’s risk assessment is based on an average of risk across a
diverse set of installed systems and may not represent the true risk of
your local installation. NVIDIA recommends consulting a security or IT
professional to evaluate the risk of your specific configuration.
Updated Products
Product
|
OS
|
GeForce, Quadro, NVS Driver Software
|
Windows, Linux, FreeBSD, Solaris
|
Tesla Driver Software
|
Windows, Linux
|
GRID Driver Software
|
Windows, Windows Server with Hyper-V, Linux, Citrix XenServer, VMware vSphere, and Red Hat KVM
|
Security Updates for CPU Speculative Side Channel Vulnerabilities
When available, download the updates from the NVIDIA Driver Downloads page.
http://www.nvidia.com/Download/index.aspx
If you are an Enterprise Service customer using NVIDIA GRID, visit the NVIDIA Licensing Center to obtain NVIDIA GRID updates.
http://nvidia.flexnetoperations.com/
If you are an Enterprise Service customer using DGX-1 or DGX Station, visit the NVIDIA Enterprise Portal for guidance.
http://nvidia.flexnetoperations.com/
Windows
Product
|
Product Series
|
OS
|
Driver Branch
|
Updated Version
|
GeForce
|
All
|
Windows
|
R390
|
390.65
|
Quadro, NVS
|
All
|
Windows
|
R390
|
390.65
|
R384
|
386.07
|
Tesla
|
All
|
Windows
|
R390
|
Expected week of January 22, 2018
|
R384
|
386.07
|
GRID
|
All
|
Windows, Windows Server with Hyper-V
|
R367
|
Expected before the end of January 2018
|
Linux
Product
|
Product Series
|
OS
|
Driver Branch
|
Updated Version
|
GeForce
|
All
|
Linux, FreeBSD, Solaris
|
R390
|
390.12
|
R384
|
384.111
|
Quadro, NVS
|
All
|
Linux, FreeBSD, Solaris
|
R390
|
390.12
|
R384
|
384.111
|
Tesla
|
All
|
Linux
|
R390
|
Expected week of January 22, 2018
|
R384
|
384.111
|
GRID
|
All
|
Linux, Citrix XenServer, VMware vSphere, and Red Hat KVM
|
R367
|
Expected before the end of January 2018
|
Notes
-
The Linux driver contains updates to maintain compatibility with recent Linux updates for this security issue.
-
If you are using earlier driver branches of the affected products,
upgrade to a supported driver branch that contains the udpate as listed
in the tables for Windows and Linux.
Acknowledgements
None.
Get the Most Up to Date Product Security Information
To learn more about the vulnerability management process followed by
the NVIDIA Product Security Incident Response Team (PSIRT), see the
current list of NVIDIA security bulletins, or subscribe to security
bulletin notifications, go to NVIDIA Product Security.
Revision History
Revision
|
Date
|
Description
|
5.0
|
January 10, 2018
|
Added clarification that GPU hardware is
not
affected and that NVIDIA is updating its drivers to help mitigate the CPU security issue
|
4.0
|
January 9, 2018
|
Added information about updated NVIDIA GRID products
|
3.0
|
January 9, 2018
|
Added the driver version for Tesla Compute on Windows and Linux
|
2.0
|
January 8, 2018
|
Added the driver version for GeForce and Quadro, NVS on Windows
|
1.0
|
January 4, 2018
|
Initial release
|
Frequently Asked Questions (FAQs)
How do I know what driver version I have installed?
-
Launch Windows Device Manager.
-
Select
Display Adapters
.
-
Select the
NVIDIA GPU
node and right-click.
-
Go to the
Driver
tab.
The driver version can be deciphered as shown in the following examples: 10.18.13.6472 is 364.72 and 10.18.13.472 is 304.72
现在,Intel也发布了面向Linux系统的微代码更新补丁,可以在各个Linux发行版上修复所有受影响CPU的漏洞。
支持的操作系统涵盖了近些年的几乎所有流行发行版本:Red Hat Enterprise Linux 7.4/7.3/7.2/7.1/7.0、Red Hat Enterprise Linux 6.8/6.7/6.6/6.5/6.4/6.3/6.2、SUSE Linux Enterprise Server 12/SP3/SP2/SP1、SUSE Linux Enterprise Server 11/SP4/SP3/SP2/SP1、SUSE Linux Enterprise Server (SLES) 12.2、CentOS 7.4/7.3/7.2/7.1/7.0、Debian 8.x/7.x、Fedora 24/23、Ubuntu 16.04 LTS/14.04 LTS。
Linux* Processor Microcode Data File
https://downloadcenter.intel.com/downloads/eula/27431/Linux-Processor-Microcode-Data-File?httpDown=https%3A%2F%2Fdownloadmirror.intel.com%2F27431%2Feng%2Fmicrocode-20180108.tgz
注
:本文转载自网络,不完全代表编者观点,如有错误和不足之处欢迎在留言中批评指正。
进一步交流
技术
,
可以
加我的
QQ/
微信:
490834312
。如果您想在这个公众号上分享自己的技术干货,也欢迎联系我:)
感谢您的阅读和支持!《企业存储技术》微信公众号:
HL_Storage
长按二维码可直接识别关注
历史文章汇总
:
http://chuansong.me/account/huangliang_storage