Advertisement
Guest User

Kernel 4.15.5 Spectre Mitigation Intel i7

a guest
Feb 22nd, 2018
142
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.33 KB | None | 0 0
  1. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  2. * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
  3. * Kernel has array_index_mask_nospec: YES (1 occurence(s) found of 64 bits array_index_mask_nospec())
  4. * Kernel has the Red Hat/Ubuntu patch: NO
  5. > STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
  6.  
  7. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  8. * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
  9. * Mitigation 1
  10. * Kernel is compiled with IBRS/IBPB support: NO
  11. * Currently enabled features
  12. * IBRS enabled for Kernel space: NO
  13. * IBRS enabled for User space: NO
  14. * IBPB enabled: NO
  15. * Mitigation 2
  16. * Kernel compiled with retpoline option: YES
  17. * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
  18. > STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline - vulnerable module loaded)
  19.  
  20. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  21. * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
  22. * Kernel supports Page Table Isolation (PTI): YES
  23. * PTI enabled and active: YES
  24. * Running as a Xen PV DomU: NO
  25. > STATUS: NOT VULNERABLE (Mitigation: PTI)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement