Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
- * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
- * Kernel has array_index_mask_nospec: YES (1 occurence(s) found of 64 bits array_index_mask_nospec())
- * Kernel has the Red Hat/Ubuntu patch: NO
- > STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
- CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
- * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
- * Mitigation 1
- * Kernel is compiled with IBRS/IBPB support: NO
- * Currently enabled features
- * IBRS enabled for Kernel space: NO
- * IBRS enabled for User space: NO
- * IBPB enabled: NO
- * Mitigation 2
- * Kernel compiled with retpoline option: YES
- * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
- > STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline - vulnerable module loaded)
- CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
- * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
- * Kernel supports Page Table Isolation (PTI): YES
- * PTI enabled and active: YES
- * Running as a Xen PV DomU: NO
- > STATUS: NOT VULNERABLE (Mitigation: PTI)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement