Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Spectre and Meltdown mitigation detection tool v0.19
- Checking for vulnerabilities against live running kernel Linux 4.15.0-041500rc7-generic #201801072330 SMP Sun Jan 7 23:31:29 UTC 2018 x86_64
- Will use vmlinux image /boot/vmlinuz-4.15.0-041500rc7-generic
- Will use kconfig /boot/config-4.15.0-041500rc7-generic
- Will use System.map file /proc/kallsyms
- CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
- * Checking count of LFENCE opcodes in kernel: NO (only 43 opcodes found, should be >= 70)
- > STATUS: VULNERABLE (heuristic to be improved when official patches become available)
- CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
- * Mitigation 1
- * Hardware (CPU microcode) support for mitigation: NO
- * Kernel support for IBRS: NO
- * IBRS enabled for Kernel space: NO
- * IBRS enabled for User space: NO
- * Mitigation 2
- * Kernel compiled with retpoline option: NO
- * Kernel compiled with a retpoline-aware compiler: NO
- > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
- CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
- * Kernel supports Page Table Isolation (PTI): YES
- * PTI enabled and active: YES
- > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement