Advertisement
Mohamad2022

Untitled

Jan 26th, 2022
136
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.82 KB | None | 0 0
  1.  
  2. Spectre and Meltdown mitigation detection tool v0.44
  3.  
  4. Checking for vulnerabilities on current system
  5. Kernel is Linux 5.3.18-150300.59.43-preempt #1 SMP PREEMPT Sun Jan 23 19:27:23 UTC 2022 (c76af22) x86_64
  6. CPU is Intel(R) Core(TM) i3 CPU 540 @ 3.07GHz
  7.  
  8. Hardware check
  9. * Hardware support (CPU microcode) for mitigation techniques
  10. * Indirect Branch Restricted Speculation (IBRS)
  11. * SPEC_CTRL MSR is available: YES
  12. * CPU indicates IBRS capability: YES (SPEC_CTRL feature bit)
  13. * Indirect Branch Prediction Barrier (IBPB)
  14. * PRED_CMD MSR is available: YES
  15. * CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
  16. * Single Thread Indirect Branch Predictors (STIBP)
  17. * SPEC_CTRL MSR is available: YES
  18. * CPU indicates STIBP capability: YES (Intel STIBP feature bit)
  19. * Speculative Store Bypass Disable (SSBD)
  20. * CPU indicates SSBD capability: YES (Intel SSBD)
  21. * L1 data cache invalidation
  22. * FLUSH_CMD MSR is available: YES
  23. * CPU indicates L1D flush capability: YES (L1D flush feature bit)
  24. * Microarchitectural Data Sampling
  25. * VERW instruction is available: NO
  26. * Enhanced IBRS (IBRS_ALL)
  27. * CPU indicates ARCH_CAPABILITIES MSR availability: NO
  28. * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
  29. * CPU explicitly indicates not being vulnerable to Meltdown/L1TF (RDCL_NO): NO
  30. * CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO): NO
  31. * CPU/Hypervisor indicates L1D flushing is not necessary on this system: NO
  32. * Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA): NO
  33. * CPU explicitly indicates not being vulnerable to Microarchitectural Data Sampling (MDS_NO): NO
  34. * CPU explicitly indicates not being vulnerable to TSX Asynchronous Abort (TAA_NO): NO
  35. * CPU explicitly indicates not being vulnerable to iTLB Multihit (PSCHANGE_MSC_NO): NO
  36. * CPU explicitly indicates having MSR for TSX control (TSX_CTRL_MSR): NO
  37. * CPU supports Transactional Synchronization Extensions (TSX): NO
  38. * CPU supports Software Guard Extensions (SGX): NO
  39. * CPU supports Special Register Buffer Data Sampling (SRBDS): NO
  40. * CPU microcode is known to cause stability problems: NO (family 0x6 model 0x25 stepping 0x5 ucode 0x7 cpuid 0x20655)
  41. * CPU microcode is the latest known available version: YES (latest version is 0x7 dated 2018/04/23 according to builtin firmwares DB v165.20201021+i20200616)
  42. * CPU vulnerability to the speculative execution attack variants
  43. * Vulnerable to CVE-2017-5753 (Spectre Variant 1, bounds check bypass): YES
  44. * Vulnerable to CVE-2017-5715 (Spectre Variant 2, branch target injection): YES
  45. * Vulnerable to CVE-2017-5754 (Variant 3, Meltdown, rogue data cache load): YES
  46. * Vulnerable to CVE-2018-3640 (Variant 3a, rogue system register read): YES
  47. * Vulnerable to CVE-2018-3639 (Variant 4, speculative store bypass): YES
  48. * Vulnerable to CVE-2018-3615 (Foreshadow (SGX), L1 terminal fault): NO
  49. * Vulnerable to CVE-2018-3620 (Foreshadow-NG (OS), L1 terminal fault): YES
  50. * Vulnerable to CVE-2018-3646 (Foreshadow-NG (VMM), L1 terminal fault): YES
  51. * Vulnerable to CVE-2018-12126 (Fallout, microarchitectural store buffer data sampling (MSBDS)): YES
  52. * Vulnerable to CVE-2018-12130 (ZombieLoad, microarchitectural fill buffer data sampling (MFBDS)): YES
  53. * Vulnerable to CVE-2018-12127 (RIDL, microarchitectural load port data sampling (MLPDS)): YES
  54. * Vulnerable to CVE-2019-11091 (RIDL, microarchitectural data sampling uncacheable memory (MDSUM)): YES
  55. * Vulnerable to CVE-2019-11135 (ZombieLoad V2, TSX Asynchronous Abort (TAA)): NO
  56. * Vulnerable to CVE-2018-12207 (No eXcuses, iTLB Multihit, machine check exception on page size changes (MCEPSC)): YES
  57. * Vulnerable to CVE-2020-0543 (Special Register Buffer Data Sampling (SRBDS)): NO
  58.  
  59. CVE-2017-5753 aka 'Spectre Variant 1, bounds check bypass'
  60. * Mitigated according to the /sys interface: YES (Mitigation: usercopy/swapgs barriers and __user pointer sanitization)
  61. * Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86 64 bits array_index_mask_nospec())
  62. * Kernel has the Red Hat/Ubuntu patch: NO
  63. * Kernel has mask_nospec64 (arm64): NO
  64. * Kernel has array_index_nospec (arm64): NO
  65. > STATUS: NOT VULNERABLE (Mitigation: usercopy/swapgs barriers and __user pointer sanitization)
  66.  
  67. CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
  68. * Mitigated according to the /sys interface: YES (Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling)
  69. * Mitigation 1
  70. * Kernel is compiled with IBRS support: YES
  71. * IBRS enabled and active: YES (for firmware code only)
  72. * Kernel is compiled with IBPB support: YES
  73. * IBPB enabled and active: YES
  74. * Mitigation 2
  75. * Kernel has branch predictor hardening (arm): NO
  76. * Kernel compiled with retpoline option: YES
  77. * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
  78. > STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the vulnerability)
  79.  
  80. CVE-2017-5754 aka 'Variant 3, Meltdown, rogue data cache load'
  81. * Mitigated according to the /sys interface: YES (Mitigation: PTI)
  82. * Kernel supports Page Table Isolation (PTI): YES
  83. * PTI enabled and active: YES
  84. * Reduced performance impact of PTI: YES (CPU supports PCID, performance impact of PTI will be reduced)
  85. * Running as a Xen PV DomU: NO
  86. > STATUS: NOT VULNERABLE (Mitigation: PTI)
  87.  
  88. CVE-2018-3640 aka 'Variant 3a, rogue system register read'
  89. * CPU microcode mitigates the vulnerability: YES
  90. > STATUS: NOT VULNERABLE (your CPU microcode mitigates the vulnerability)
  91.  
  92. CVE-2018-3639 aka 'Variant 4, speculative store bypass'
  93. * Mitigated according to the /sys interface: YES (Mitigation: Speculative Store Bypass disabled via prctl and seccomp)
  94. * Kernel supports disabling speculative store bypass (SSB): YES (found in /proc/self/status)
  95. * SSB mitigation is enabled and active: YES (per-thread through prctl)
  96. * SSB mitigation currently active for selected processes: YES (bwrap gconf-helper ModemManager pipewire pipewire-media-session pulseaudio systemd-hostnamed systemd-journald systemd-logind udevadm upowerd)
  97. > STATUS: NOT VULNERABLE (Mitigation: Speculative Store Bypass disabled via prctl and seccomp)
  98.  
  99. CVE-2018-3615 aka 'Foreshadow (SGX), L1 terminal fault'
  100. * CPU microcode mitigates the vulnerability: N/A
  101. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulnerable)
  102.  
  103. CVE-2018-3620 aka 'Foreshadow-NG (OS), L1 terminal fault'
  104. * Mitigated according to the /sys interface: YES (Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable)
  105. * Kernel supports PTE inversion: YES (found in kernel image)
  106. * PTE inversion enabled and active: YES
  107. > STATUS: NOT VULNERABLE (Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable)
  108.  
  109. CVE-2018-3646 aka 'Foreshadow-NG (VMM), L1 terminal fault'
  110. * Information from the /sys interface: Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
  111. * This system is a host running a hypervisor: NO
  112. * Mitigation 1 (KVM)
  113. * EPT is disabled: NO
  114. * Mitigation 2
  115. * L1D flush is supported by kernel: YES (found flush_l1d in /proc/cpuinfo)
  116. * L1D flush enabled: YES (conditional flushes)
  117. * Hardware-backed L1D flush supported: YES (performance impact of the mitigation will be greatly reduced)
  118. * Hyper-Threading (SMT) is enabled: YES
  119. > STATUS: NOT VULNERABLE (this system is not running a hypervisor)
  120.  
  121. CVE-2018-12126 aka 'Fallout, microarchitectural store buffer data sampling (MSBDS)'
  122. * Mitigated according to the /sys interface: NO (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable)
  123. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  124. * Kernel mitigation is enabled and active: NO
  125. * SMT is either mitigated or disabled: NO
  126. > STATUS: VULNERABLE (Your kernel supports mitigation, but your CPU microcode also needs to be updated to mitigate the vulnerability)
  127.  
  128. CVE-2018-12130 aka 'ZombieLoad, microarchitectural fill buffer data sampling (MFBDS)'
  129. * Mitigated according to the /sys interface: NO (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable)
  130. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  131. * Kernel mitigation is enabled and active: NO
  132. * SMT is either mitigated or disabled: NO
  133. > STATUS: VULNERABLE (Your kernel supports mitigation, but your CPU microcode also needs to be updated to mitigate the vulnerability)
  134.  
  135. CVE-2018-12127 aka 'RIDL, microarchitectural load port data sampling (MLPDS)'
  136. * Mitigated according to the /sys interface: NO (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable)
  137. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  138. * Kernel mitigation is enabled and active: NO
  139. * SMT is either mitigated or disabled: NO
  140. > STATUS: VULNERABLE (Your kernel supports mitigation, but your CPU microcode also needs to be updated to mitigate the vulnerability)
  141.  
  142. CVE-2019-11091 aka 'RIDL, microarchitectural data sampling uncacheable memory (MDSUM)'
  143. * Mitigated according to the /sys interface: NO (Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable)
  144. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  145. * Kernel mitigation is enabled and active: NO
  146. * SMT is either mitigated or disabled: NO
  147. > STATUS: VULNERABLE (Your kernel supports mitigation, but your CPU microcode also needs to be updated to mitigate the vulnerability)
  148.  
  149. CVE-2019-11135 aka 'ZombieLoad V2, TSX Asynchronous Abort (TAA)'
  150. * Mitigated according to the /sys interface: YES (Not affected)
  151. * TAA mitigation is supported by kernel: YES (found tsx_async_abort in kernel image)
  152. * TAA mitigation enabled and active: NO
  153. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulnerable)
  154.  
  155. CVE-2018-12207 aka 'No eXcuses, iTLB Multihit, machine check exception on page size changes (MCEPSC)'
  156. * Mitigated according to the /sys interface: YES (KVM: Mitigation: VMX disabled)
  157. * This system is a host running a hypervisor: NO
  158. * iTLB Multihit mitigation is supported by kernel: YES (found itlb_multihit in kernel image)
  159. * iTLB Multihit mitigation enabled and active: YES (KVM: Mitigation: VMX disabled)
  160. > STATUS: NOT VULNERABLE (this system is not running a hypervisor)
  161.  
  162. CVE-2020-0543 aka 'Special Register Buffer Data Sampling (SRBDS)'
  163. * Mitigated according to the /sys interface: YES (Not affected)
  164. * SRBDS mitigation control is supported by the kernel: YES (found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation)
  165. * SRBDS mitigation control is enabled and active: NO
  166. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulnerable)
  167.  
  168. > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:KO CVE-2018-12130:KO CVE-2018-12127:KO CVE-2019-11091:KO CVE-2019-11135:OK CVE-2018-12207:OK CVE-2020-0543:OK
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement