Advertisement
Guest User

Untitled

a guest
Sep 13th, 2019
591
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.58 KB | None | 0 0
  1. pi@raspberrypi:~ $ sudo ./spectre-meltdown-checker.sh
  2. Spectre and Meltdown mitigation detection tool v0.42
  3.  
  4. Checking for vulnerabilities on current system
  5. Kernel is Linux 4.19.57-v7l+ #1244 SMP Thu Jul 4 18:48:07 BST 2019 armv7l
  6. CPU is ARM v7 model 0xd08
  7. We're missing some kernel info (see -v), accuracy might be reduced
  8. Possible disrepancy between your running kernel '4.19.57-v7l+' and the image '4. 19.57-v7+ #1244 SMP Thu Jul 4 18:45:25 BST 2019 ' we found (/boot/kernel7.img), results might be incorrect
  9.  
  10. Hardware check
  11. * CPU vulnerability to the speculative execution attack variants
  12. * Vulnerable to CVE-2017-5753 (Spectre Variant 1, bounds check bypass): NO
  13. * Vulnerable to CVE-2017-5715 (Spectre Variant 2, branch target injection): N O
  14. * Vulnerable to CVE-2017-5754 (Variant 3, Meltdown, rogue data cache load): N O
  15. * Vulnerable to CVE-2018-3640 (Variant 3a, rogue system register read): NO
  16. * Vulnerable to CVE-2018-3639 (Variant 4, speculative store bypass): NO
  17. * Vulnerable to CVE-2018-3615 (Foreshadow (SGX), L1 terminal fault): NO
  18. * Vulnerable to CVE-2018-3620 (Foreshadow-NG (OS), L1 terminal fault): NO
  19. * Vulnerable to CVE-2018-3646 (Foreshadow-NG (VMM), L1 terminal fault): NO
  20. * Vulnerable to CVE-2018-12126 (Fallout, microarchitectural store buffer data sampling (MSBDS)): NO
  21. * Vulnerable to CVE-2018-12130 (ZombieLoad, microarchitectural fill buffer dat a sampling (MFBDS)): NO
  22. * Vulnerable to CVE-2018-12127 (RIDL, microarchitectural load port data sampli ng (MLPDS)): NO
  23. * Vulnerable to CVE-2019-11091 (RIDL, microarchitectural data sampling uncache able memory (MDSUM)): NO
  24.  
  25. CVE-2017-5753 aka 'Spectre Variant 1, bounds check bypass'
  26. * Kernel has array_index_mask_nospec: NO
  27. * Kernel has the Red Hat/Ubuntu patch: NO
  28. * Kernel has mask_nospec64 (arm64): NO
  29. * Checking count of LFENCE instructions following a jump in kernel... NO (only 0 jump-then-lfence instructions found, should be >= 30 (heuristic))
  30. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  31.  
  32. CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
  33. * Mitigation 1
  34. * Kernel is compiled with IBRS support: YES
  35. * IBRS enabled and active: NO
  36. * Kernel is compiled with IBPB support: NO
  37. * IBPB enabled and active: NO
  38. * Mitigation 2
  39. * Kernel has branch predictor hardening (arm): NO
  40. * Kernel compiled with retpoline option: UNKNOWN (couldn't read your kernel configuration)
  41. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  42.  
  43. CVE-2017-5754 aka 'Variant 3, Meltdown, rogue data cache load'
  44. * Kernel supports Page Table Isolation (PTI): NO
  45. * PTI enabled and active: NO
  46. * Reduced performance impact of PTI: NO (PCID/INVPCID not supported, perform ance impact of PTI will be significant)
  47. * Running as a Xen PV DomU: NO
  48. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  49.  
  50. CVE-2018-3640 aka 'Variant 3a, rogue system register read'
  51. * CPU microcode mitigates the vulnerability: NO
  52. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  53.  
  54. CVE-2018-3639 aka 'Variant 4, speculative store bypass'
  55. * Kernel supports disabling speculative store bypass (SSB): YES (found in /pro c/self/status)
  56. * SSB mitigation is enabled and active: > STATUS: NOT VULNERABLE (your CPU ven dor reported your CPU model as not vulnerable)
  57.  
  58. CVE-2018-3615 aka 'Foreshadow (SGX), L1 terminal fault'
  59. * CPU microcode mitigates the vulnerability: N/A
  60. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  61.  
  62. CVE-2018-3620 aka 'Foreshadow-NG (OS), L1 terminal fault'
  63. * Kernel supports PTE inversion: NO
  64. * PTE inversion enabled and active: UNKNOWN (sysfs interface not available)
  65. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  66.  
  67. CVE-2018-3646 aka 'Foreshadow-NG (VMM), L1 terminal fault'
  68. * This system is a host running a hypervisor: NO
  69. * Mitigation 1 (KVM)
  70. * EPT is disabled: N/A (the kvm_intel module is not loaded)
  71. * Mitigation 2
  72. * L1D flush is supported by kernel: NO
  73. * L1D flush enabled: UNKNOWN (can't find or read /sys/devices/system/cpu/vul nerabilities/l1tf)
  74. * Hardware-backed L1D flush supported: NO (flush will be done in software, t his is slower)
  75. * Hyper-Threading (SMT) is enabled: UNKNOWN
  76. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  77.  
  78. CVE-2018-12126 aka 'Fallout, microarchitectural store buffer data sampling (MSBD S)'
  79. * Kernel supports using MD_CLEAR mitigation: NO
  80. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  81.  
  82. CVE-2018-12130 aka 'ZombieLoad, microarchitectural fill buffer data sampling (MF BDS)'
  83. * Kernel supports using MD_CLEAR mitigation: NO
  84. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  85.  
  86. CVE-2018-12127 aka 'RIDL, microarchitectural load port data sampling (MLPDS)'
  87. * Kernel supports using MD_CLEAR mitigation: NO
  88. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  89.  
  90. CVE-2019-11091 aka 'RIDL, microarchitectural data sampling uncacheable memory (M DSUM)'
  91. * Kernel supports using MD_CLEAR mitigation: NO
  92. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulne rable)
  93.  
  94. > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK C VE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-1212 6:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK
  95.  
  96. We're missing some kernel info (see -v), accuracy might be reduced
  97. Need more detailed information about mitigation options? Use --explain
  98. A false sense of security is worse than no security at all, see --disclaimer
  99. pi@raspberrypi:~ $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement