Advertisement
Guest User

Untitled

a guest
Jan 12th, 2018
116
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.52 KB | None | 0 0
  1. [root@nygus spectre-meltdown-checker]# ./spectre-meltdown-checker.sh
  2. Spectre and Meltdown mitigation detection tool v0.28
  3.  
  4. Checking for vulnerabilities against running kernel Linux 3.10.0-693.11.1.el7.x86_64 #1 SMP Mon Dec 4 23:52:40 UTC 2017 x86_64
  5. CPU is Intel Core Processor (Haswell, no TSX)
  6.  
  7. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  8. * Checking count of LFENCE opcodes in kernel: NO
  9. > STATUS: VULNERABLE (only 21 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
  10.  
  11. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  12. * Mitigation 1
  13. * Hardware (CPU microcode) support for mitigation: NO
  14. * Kernel support for IBRS: NO
  15. * IBRS enabled for Kernel space: NO
  16. * IBRS enabled for User space: NO
  17. * Mitigation 2
  18. * Kernel compiled with retpoline option: NO
  19. * Kernel compiled with a retpoline-aware compiler: NO
  20. > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
  21.  
  22. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  23. * Kernel supports Page Table Isolation (PTI): NO
  24. * PTI enabled and active: NO
  25. > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability)
  26.  
  27. A false sense of security is worse than no security at all, see --disclaimer
  28. [root@nygus spectre-meltdown-checker]# rpm -qa|grep kernel-3
  29. kernel-3.10.0-693.5.2.el7.x86_64
  30. kernel-3.10.0-693.11.6.el7.x86_64
  31. kernel-3.10.0-693.11.1.el7.x86_64
  32. [root@nygus spectre-meltdown-checker]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement