Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@nygus spectre-meltdown-checker]# ./spectre-meltdown-checker.sh
- Spectre and Meltdown mitigation detection tool v0.28
- Checking for vulnerabilities against running kernel Linux 3.10.0-693.11.1.el7.x86_64 #1 SMP Mon Dec 4 23:52:40 UTC 2017 x86_64
- CPU is Intel Core Processor (Haswell, no TSX)
- CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
- * Checking count of LFENCE opcodes in kernel: NO
- > STATUS: VULNERABLE (only 21 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
- CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
- * Mitigation 1
- * Hardware (CPU microcode) support for mitigation: NO
- * Kernel support for IBRS: NO
- * IBRS enabled for Kernel space: NO
- * IBRS enabled for User space: NO
- * Mitigation 2
- * Kernel compiled with retpoline option: NO
- * Kernel compiled with a retpoline-aware compiler: NO
- > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
- CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
- * Kernel supports Page Table Isolation (PTI): NO
- * PTI enabled and active: NO
- > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability)
- A false sense of security is worse than no security at all, see --disclaimer
- [root@nygus spectre-meltdown-checker]# rpm -qa|grep kernel-3
- kernel-3.10.0-693.5.2.el7.x86_64
- kernel-3.10.0-693.11.6.el7.x86_64
- kernel-3.10.0-693.11.1.el7.x86_64
- [root@nygus spectre-meltdown-checker]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement