Guest User

Mint 18.3/Kernel 4.14.13

a guest
Jan 18th, 2018
273
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.40 KB | None | 0 0
  1. Spectre and Meltdown mitigation detection tool v0.31
  2.  
  3. Checking for vulnerabilities against running kernel Linux 4.14.13-041413-generic #201801101001 SMP Wed Jan 10 10:02:53 UTC 2018 x86_64
  4. CPU is Intel(R) Core(TM) i7 CPU 960 @ 3.20GHz
  5.  
  6. CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
  7. * Checking count of LFENCE opcodes in kernel: NO
  8. > STATUS: VULNERABLE (only 29 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
  9.  
  10. CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
  11. * Mitigation 1
  12. * Hardware (CPU microcode) support for mitigation
  13. * The SPEC_CTRL MSR is available: NO
  14. * The SPEC_CTRL CPUID feature bit is set: NO
  15. * Kernel support for IBRS: NO
  16. * IBRS enabled for Kernel space: NO
  17. * IBRS enabled for User space: NO
  18. * Mitigation 2
  19. * Kernel compiled with retpoline option: NO
  20. * Kernel compiled with a retpoline-aware compiler: NO
  21. > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
  22.  
  23. CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
  24. * Kernel supports Page Table Isolation (PTI): YES
  25. * PTI enabled and active: YES
  26. * Checking if we're running under Xen PV (64 bits): NO
  27. > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
  28.  
  29. A false sense of security is worse than no security at all, see --disclaimer
Advertisement
Add Comment
Please, Sign In to add comment