Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Spectre and Meltdown mitigation detection tool v0.31
- Checking for vulnerabilities against running kernel Linux 4.14.13-041413-generic #201801101001 SMP Wed Jan 10 10:02:53 UTC 2018 x86_64
- CPU is Intel(R) Core(TM) i7 CPU 960 @ 3.20GHz
- CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
- * Checking count of LFENCE opcodes in kernel: NO
- > STATUS: VULNERABLE (only 29 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
- CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
- * Mitigation 1
- * Hardware (CPU microcode) support for mitigation
- * The SPEC_CTRL MSR is available: NO
- * The SPEC_CTRL CPUID feature bit is set: NO
- * Kernel support for IBRS: NO
- * IBRS enabled for Kernel space: NO
- * IBRS enabled for User space: NO
- * Mitigation 2
- * Kernel compiled with retpoline option: NO
- * Kernel compiled with a retpoline-aware compiler: NO
- > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
- CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
- * Kernel supports Page Table Isolation (PTI): YES
- * PTI enabled and active: YES
- * Checking if we're running under Xen PV (64 bits): NO
- > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
- A false sense of security is worse than no security at all, see --disclaimer
Advertisement
Add Comment
Please, Sign In to add comment