普存计算
FAQ
[Server]Intel CPU 漏洞
最近更新 : 2018/09/11

關於Intel CPU 漏洞:Spectre” and “Meltdown”

“Spectre” and “Meltdown” Side-channel Security Vulnerabilities and Mitigations (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)

“Spectre” and “Meltdown” Side-channel Security Vulnerabilities and Mitigations (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)

Updated by August 27th, 2018

ASUS is aware of the Meltdown and Spectre vulnerabilities to modern CPU architectures, which may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Mitigations include both operating system and firmware updates. For more information, please review the security updates from CPU vendors, Intel and AMD .

Variant 1

CVE-2017-5753

Spectre

Bounds check bypass

Requires OS update

Variant 2

CVE-2017-5715

Spectre

Branch target injection

Requires OS update

Requires BIOS update (MCU)

Variant 3

CVE-2017-5754

Meltdown

Rogue data cache load

Requires OS update

Requires BIOS update (MCU)

In response to the recommendation from CPU vendors, ASUS is taking the following actions:

  • 产品: 3U 机架式GPU 并行超算服务器
  • 分类: USB / HDMI 和其他接口
  • 类型: 产品知识

在线客服

与客服专员在线对话,实时回复问题

在线客服
    以上部分信息可能部分或全部引用于华硕外部网站,请以标注之数据源为准,如有疑问请直接洽询该来源,华硕与此信息或服务无涉。 此篇知识可能不适用于所有同类型/系列的产品,部分画面选项或操作步骤可能会因为软件版本的不同而有差异。 华硕提供您此非华硕所制造之产品的相关信息仅为参考之用,请直接洽询该厂商以了解产品详情,华硕与此信息或服务无涉。