Advertisement
Guest User

rc6-sound26

a guest
Jan 10th, 2018
237
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.19 KB | None | 0 0
  1. Checking for vulnerabilities against live running kernel Linux 4.15.0-rc6-sound-26 #3 SMP PREEMPT Sun Jan 7 18:53:37 CET 2018 x86_64
  2. Will use vmlinux image /boot/vmlinuz-4.15.0-rc6-sound-26
  3. Will use kconfig /proc/config.gz
  4. Will use System.map file /proc/kallsyms
  5.  
  6. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  7. * Checking count of LFENCE opcodes in kernel: NO (only 22 opcodes found, should be >= 70)
  8. > STATUS: VULNERABLE (heuristic to be improved when official patches become available)
  9.  
  10. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  11. * Mitigation 1
  12. * Hardware (CPU microcode) support for mitigation: NO
  13. * Kernel support for IBRS: NO
  14. * IBRS enabled for Kernel space: NO
  15. * IBRS enabled for User space: NO
  16. * Mitigation 2
  17. * Kernel compiled with retpoline option: NO
  18. * Kernel compiled with a retpoline-aware compiler: NO
  19. > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
  20.  
  21. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  22. * Kernel supports Page Table Isolation (PTI): NO
  23. * PTI enabled and active: NO
  24. > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement