Advertisement
Guest User

vanilla-rc7

a guest
Jan 10th, 2018
337
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.28 KB | None | 0 0
  1. Spectre and Meltdown mitigation detection tool v0.19
  2.  
  3. Checking for vulnerabilities against live running kernel Linux 4.15.0-041500rc7-generic #201801072330 SMP Sun Jan 7 23:31:29 UTC 2018 x86_64
  4. Will use vmlinux image /boot/vmlinuz-4.15.0-041500rc7-generic
  5. Will use kconfig /boot/config-4.15.0-041500rc7-generic
  6. Will use System.map file /proc/kallsyms
  7.  
  8. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  9. * Checking count of LFENCE opcodes in kernel: NO (only 43 opcodes found, should be >= 70)
  10. > STATUS: VULNERABLE (heuristic to be improved when official patches become available)
  11.  
  12. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  13. * Mitigation 1
  14. * Hardware (CPU microcode) support for mitigation: NO
  15. * Kernel support for IBRS: NO
  16. * IBRS enabled for Kernel space: NO
  17. * IBRS enabled for User space: NO
  18. * Mitigation 2
  19. * Kernel compiled with retpoline option: NO
  20. * Kernel compiled with a retpoline-aware compiler: NO
  21. > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
  22.  
  23. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  24. * Kernel supports Page Table Isolation (PTI): YES
  25. * PTI enabled and active: YES
  26. > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement