Guest User

Untitled

a guest
Jan 12th, 2018
81
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.09 KB | None | 0 0
  1. aceraspire@aceraspire:~$ wget -O meltdown.sh https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh && sudo sh meltdown.sh
  2. --2018-01-13 02:29:33-- https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh
  3. Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.16.133
  4. Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.16.133|:443... connected.
  5. HTTP request sent, awaiting response... 200 OK
  6. Length: 31879 (31K) [text/plain]
  7. Saving to: ‘meltdown.sh’
  8.  
  9. meltdown.sh 100%[=======================================================================>] 31.13K --.-KB/s in 0.02s
  10.  
  11. 2018-01-13 02:29:33 (1.64 MB/s) - ‘meltdown.sh’ saved [31879/31879]
  12.  
  13. [sudo] password for aceraspire:
  14. Spectre and Meltdown mitigation detection tool v0.28
  15.  
  16. Checking for vulnerabilities against running kernel Linux 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:14:41 UTC 2018 x86_64
  17. CPU is Intel(R) Celeron(R) CPU N3050 @ 1.60GHz
  18.  
  19. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  20. * Checking count of LFENCE opcodes in kernel: NO
  21. > STATUS: VULNERABLE (only 29 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
  22.  
  23. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  24. * Mitigation 1
  25. * Hardware (CPU microcode) support for mitigation: NO
  26. * Kernel support for IBRS: NO
  27. * IBRS enabled for Kernel space: NO
  28. * IBRS enabled for User space: NO
  29. * Mitigation 2
  30. * Kernel compiled with retpoline option: NO
  31. * Kernel compiled with a retpoline-aware compiler: NO
  32. > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
  33.  
  34. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  35. * Kernel supports Page Table Isolation (PTI): YES
  36. * PTI enabled and active: YES
  37. > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
  38.  
  39. A false sense of security is worse than no security at all, see --disclaimer
Advertisement
Add Comment
Please, Sign In to add comment