Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
- * Mitigated according to the /sys interface: NO (kernel confirms your system is vulnerable)
- * Kernel has array_index_mask_nospec: NO
- * Checking count of LFENCE instructions following a jump in kernel: NO (only 6 jump-then-lfence instructions found, should be >= 30 (heuristic))
- > STATUS: VULNERABLE (Kernel source needs to be patched to mitigate the vulnerability)
- CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
- * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
- * Mitigation 1
- * Kernel is compiled with IBRS/IBPB support: NO
- * Currently enabled features
- * IBRS enabled for Kernel space: NO
- * IBRS enabled for User space: NO
- * IBPB enabled: NO
- * Mitigation 2
- * Kernel compiled with retpoline option: YES
- * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
- * Retpoline enabled: YES
- > STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline)
- CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
- * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)
- * Kernel supports Page Table Isolation (PTI): YES
- * PTI enabled and active: YES
- * Running as a Xen PV DomU: NO
- > STATUS: NOT VULNERABLE (Mitigation: PTI)
Advertisement
Add Comment
Please, Sign In to add comment