{"id":26786,"date":"2018-01-24T10:53:03","date_gmt":"2018-01-24T02:53:03","guid":{"rendered":"https:\/\/www.deepin.org\/?p=26786"},"modified":"2018-03-09T16:29:40","modified_gmt":"2018-03-09T08:29:40","slug":"deepin-security-update-fixed-meltdown-and-specter-security-vulnerability-cve-2017-5754-1","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/deepin-security-update-fixed-meltdown-and-specter-security-vulnerability-cve-2017-5754-1\/","title":{"rendered":"Deepin Security Updates\u2014\u2014Fixed Meltdown and Specter Security Vulnerability (CVE-2017-5754)(1)"},"content":{"rendered":"<img loading=\"lazy\" class=\"alignnone size-full wp-image-26799\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2018\/01\/en-2.jpg\" alt=\"en\" width=\"749\" height=\"321\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2.jpg 749w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-600x257.jpg 600w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-150x64.jpg 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-300x129.jpg 300w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-24x10.jpg 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-36x15.jpg 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en-2-48x21.jpg 48w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>Google Project Zero and other security teams disclosed\u00a0that there was a serious security vulnerability in Intel and other processor chips, issued a A-level vulnerability risk notice, and reminded that the vulnerability evolved into a A-level cyber security disaster for the cloud and information infrastructure. Relevant vulnerabilities exploit the implementation flaws of the acceleration mechanism worked at chip hardware level to execute side-channel attacks, and indirectly read system memory through CPU cache. Meltdown is named for \"melting\" the hardware security boundary, and Specter is named for its invisibility.<\/p>\n<h1>Vulnerability introduction<\/h1>\n<p>There are two methods tp attack Intel processors: Meltdown and Specter. Meltdown refers to <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5754\">CVE-2017-5754<\/a> and Specter refers to <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5753\">CVE-2017-5753 <\/a>and <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5715\">CVE-2017-5715<\/a>.<\/p>\n<p>Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. The bug basically melts security boundaries which are normally enforced by the hardware. Allow low-privileged user-level applications to \"cross-boundary\" access system-level memory, resulting in data leakage.<\/p>\n<p>Spectre\u00a0breaks the isolation between different applications. The root cause is speculative execution. This is a basic optimization technique that processors employ to carry out computations for data they \"speculate\" may be useful in the future. The purpose of speculative execution is to prepare computational results and have them ready if they're ever needed. In the process, Intel did not well isolate low-privileged applications from accessing kernel memory, which means that attackers could deliver malicious applications to get private data that should be isolated.<\/p>\n<h1>Influence<\/h1>\n<p>This security incident has a wide impact,\u00a0 including:<br \/>\nProcessor chip: Intel, ARM, AMD, and other processors may also have the risks.<br \/>\nOperating System: Windows, Linux, macOS, Android<br \/>\nCloud providers: Amazon, Microsoft, Google, Tencent Cloud, Alibaba Cloud and so on<br \/>\nVarious private cloud infrastructures.<br \/>\nDesktop users may encounter attacks that combine this mechanism.<\/p>\n<h1>Harmless<\/h1>\n<p>Vulnerabilities lead to information leakage in CPU operational mechanisms. Low-level attackers can exploit vulnerabilities to remotely access user information or locally access higher-level memory data.<\/p>\n<p>In actual attack scenario, the attacker can do below under certain conditions:<\/p>\n<ul>\n<li>Access the underlying operating data, encryption keys and others in local OS;<\/li>\n<li>Bypass the isolation protection for Kernel and HyperVisor using the leaked information;<\/li>\n<li>Access the private information of other members in cloud services;<\/li>\n<li>Steal user private information such as account, password, content, email address, cookie, etc. via browser.<\/li>\n<\/ul>\n<h1>Defense suggestions<\/h1>\n<p>Meltdown and Specter are both locally executed vulnerabilities. An attacker who wants to exploit this vulnerability should have code execution privilege on the target machine at first, so as long as the user does not introduce untrusted code, it will not affect the user. However, taking into account that common user has week security awareness, it is not impossible to introduce untrustworthy code, so please fix the bug according to your own situation based on the vendor instructions.<br \/>\n<strong>Linux (Kernel)<\/strong><br \/>\nApply <a href=\"https:\/\/lwn.net\/Articles\/738975\/\">KPTI \/ KAISER patches<\/a>\u00a0to split the kernel and user spaces, preventing attackers from reading kernel memory under common user privileges.<br \/>\n<strong>Browser<\/strong><br \/>\nConsidering that the browser is a common attack surface, it is highly likely that malicious code enters user PC through the browser, so the primary defense for the individual against the vulnerabilities relies on the browser. Here are the defense methods of different browsers:<br \/>\n(1) For Google Chrome users<br \/>\nTurn on Strict Site Isolation in Chrome browser, which reduces the amount of data that can be attacked by side-channels attack, because Chrome renders content for each open website in a separate process. Chrome will fix the vulnerability in late January updates.<br \/>\n(2) For Firefox users<br \/>\nUpgrade Firefox to version 57.0.4: https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2018-01\/<\/p>\n<h1>Countermeasures<\/h1>\n<p>In deepin 15.5 updates on January 24, 2018, Linux Kernel 4.14.12 fixed Meltdown vulnerability.<br \/>\nIn Deepin Store updates on January 22, 2018 for deepin 15.5, Firefox was updated to version 57.0.4, and Chrome was updated to version 63.0.3239.132, the first phase of fixing Specter vulnerability.<br \/>\nAfter updating to Google Chrome to version 63.0.3239.132-1, please enable \"Strict site isolation\" manually:<br \/>\nType\u00a0chrome:\/\/flags\u00a0in the address bar and press\u00a0Enter.<br \/>\nScroll down the page and find \u201cStrict site isolation\u201d and press the\u00a0Enable\u00a0button.<br \/>\nRestart the Chrome browser.<br \/>\nPlease update your system as soon as possible to fix vulnerabilities.<\/p>\n<p>Note: Here are references for security updates:<br \/>\nhttps:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5754<br \/>\nhttps:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5753<br \/>\nhttps:\/\/security-tracker.debian.org\/tracker\/CVE-2017-5715<br \/>\nhttps:\/\/meltdownattack.com\/https:\/\/blog.linuxmint.com\/?p=3496<br \/>\nhttp:\/\/www.linuxidc.com\/Linux\/2018-01\/150377.htmhttps:\/\/lwn.net\/Articles\/738975\/<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-26803\" src=\"https:\/\/www.deepin.org\/wp-content\/uploads\/2018\/01\/en_s-2.jpg\" alt=\"en_s\" width=\"187\" height=\"96\" srcset=\"https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en_s-2.jpg 187w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en_s-2-150x77.jpg 150w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en_s-2-24x12.jpg 24w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en_s-2-36x18.jpg 36w, https:\/\/www.deepin.org.cn\/wp-content\/uploads\/2018\/01\/en_s-2-48x25.jpg 48w\" sizes=\"(max-width: 187px) 100vw, 187px\" \/>","protected":false},"excerpt":{"rendered":"<p>Google Project Zero and other security teams disclosed\u00a0that there was a serious security vulnerability in Intel and other processor chips, issued a A-level vulnerability risk notice, and reminded that the vulnerability evolved into a A-level cyber security disaster for the cloud and information infrastructure. Relevant vulnerabilities exploit the implementation flaws of the acceleration mechanism worked at chip hardware level to execute side-channel attacks, and indirectly read system memory through CPU cache. Meltdown is named for \"melting\" the hardware security boundary, and Specter is named for its invisibility. Vulnerability introduction There are two methods tp attack Intel processors: Meltdown and Specter. ...<a href=https:\/\/www.deepin.org.cn\/en\/deepin-security-update-fixed-meltdown-and-specter-security-vulnerability-cve-2017-5754-1\/>Read more<\/a><\/p>\n","protected":false},"author":141,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75,93],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/26786"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=26786"}],"version-history":[{"count":27,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/26786\/revisions"}],"predecessor-version":[{"id":27089,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/26786\/revisions\/27089"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=26786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=26786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=26786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}