Advertisement
Guest User

Untitled

a guest
Jul 16th, 2019
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.95 KB | None | 0 0
  1. spectre-meltdown-checker
  2. Spectre and Meltdown mitigation detection tool v0.42
  3.  
  4. Checking for vulnerabilities on current system
  5. Kernel is Linux 5.1.16-zen1 #3 ZEN SMP PREEMPT Thu Jul 4 03:22:03 AST 2019 x86_64
  6. CPU is Intel(R) Core(TM) i5-4200M CPU @ 2.50GHz
  7.  
  8. Hardware check
  9. * Hardware support (CPU microcode) for mitigation techniques
  10. * Indirect Branch Restricted Speculation (IBRS)
  11. * SPEC_CTRL MSR is available: YES
  12. * CPU indicates IBRS capability: YES (SPEC_CTRL feature bit)
  13. * Indirect Branch Prediction Barrier (IBPB)
  14. * PRED_CMD MSR is available: YES
  15. * CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
  16. * Single Thread Indirect Branch Predictors (STIBP)
  17. * SPEC_CTRL MSR is available: YES
  18. * CPU indicates STIBP capability: YES (Intel STIBP feature bit)
  19. * Speculative Store Bypass Disable (SSBD)
  20. * CPU indicates SSBD capability: YES (Intel SSBD)
  21. * L1 data cache invalidation
  22. * FLUSH_CMD MSR is available: YES
  23. * CPU indicates L1D flush capability: YES (L1D flush feature bit)
  24. * Microarchitecture Data Sampling
  25. * VERW instruction is available: NO
  26. * Enhanced IBRS (IBRS_ALL)
  27. * CPU indicates ARCH_CAPABILITIES MSR availability: NO
  28. * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
  29. * CPU explicitly indicates not being vulnerable to Meltdown/L1TF (RDCL_NO): NO
  30. * CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO): NO
  31. * CPU/Hypervisor indicates L1D flushing is not necessary on this system: NO
  32. * Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA): NO
  33. * CPU explicitly indicates not being vulnerable to Microarchitectural Data Sampling (MDS_NO): NO
  34. * CPU supports Software Guard Extensions (SGX): NO
  35. * CPU microcode is known to cause stability problems: NO (model 0x3c family 0x6 stepping 0x3 ucode 0x25 cpuid 0x306c3)
  36. * CPU microcode is the latest known available version: NO (latest version is 0x27 dated 2019/02/26 according to builtin MCExtractor DB v111 - 2019/05/18)
  37. * CPU vulnerability to the speculative execution attack variants
  38. * Vulnerable to CVE-2017-5753 (Spectre Variant 1, bounds check bypass): YES
  39. * Vulnerable to CVE-2017-5715 (Spectre Variant 2, branch target injection): YES
  40. * Vulnerable to CVE-2017-5754 (Variant 3, Meltdown, rogue data cache load): YES
  41. * Vulnerable to CVE-2018-3640 (Variant 3a, rogue system register read): YES
  42. * Vulnerable to CVE-2018-3639 (Variant 4, speculative store bypass): YES
  43. * Vulnerable to CVE-2018-3615 (Foreshadow (SGX), L1 terminal fault): NO
  44. * Vulnerable to CVE-2018-3620 (Foreshadow-NG (OS), L1 terminal fault): YES
  45. * Vulnerable to CVE-2018-3646 (Foreshadow-NG (VMM), L1 terminal fault): YES
  46. * Vulnerable to CVE-2018-12126 (Fallout, microarchitectural store buffer data sampling (MSBDS)): YES
  47. * Vulnerable to CVE-2018-12130 (ZombieLoad, microarchitectural fill buffer data sampling (MFBDS)): YES
  48. * Vulnerable to CVE-2018-12127 (RIDL, microarchitectural load port data sampling (MLPDS)): YES
  49. * Vulnerable to CVE-2019-11091 (RIDL, microarchitectural data sampling uncacheable memory (MDSUM)): YES
  50.  
  51. CVE-2017-5753 aka 'Spectre Variant 1, bounds check bypass'
  52. * Mitigated according to the /sys interface: YES (Mitigation: __user pointer sanitization)
  53. * Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86 64 bits array_index_mask_nospec())
  54. * Kernel has the Red Hat/Ubuntu patch: NO
  55. * Kernel has mask_nospec64 (arm64): NO
  56. > STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
  57.  
  58. CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
  59. * Mitigated according to the /sys interface: NO (Vulnerable, IBPB: disabled, STIBP: disabled)
  60. * Mitigation 1
  61. * Kernel is compiled with IBRS support: YES
  62. * IBRS enabled and active: UNKNOWN
  63. * Kernel is compiled with IBPB support: YES
  64. * IBPB enabled and active: YES
  65. * Mitigation 2
  66. * Kernel has branch predictor hardening (arm): NO
  67. * Kernel compiled with retpoline option: NO
  68. > STATUS: VULNERABLE (IBRS+IBPB or retpoline+IBPB is needed to mitigate the vulnerability)
  69.  
  70. CVE-2017-5754 aka 'Variant 3, Meltdown, rogue data cache load'
  71. * Mitigated according to the /sys interface: NO (Vulnerable)
  72. * Kernel supports Page Table Isolation (PTI): NO
  73. * PTI enabled and active: NO
  74. * Reduced performance impact of PTI: YES (CPU supports INVPCID, performance impact of PTI will be greatly reduced)
  75. * Running as a Xen PV DomU: NO
  76. > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability)
  77.  
  78. CVE-2018-3640 aka 'Variant 3a, rogue system register read'
  79. * CPU microcode mitigates the vulnerability: YES
  80. > STATUS: NOT VULNERABLE (your CPU microcode mitigates the vulnerability)
  81.  
  82. CVE-2018-3639 aka 'Variant 4, speculative store bypass'
  83. * Mitigated according to the /sys interface: NO (Vulnerable)
  84. * Kernel supports disabling speculative store bypass (SSB): YES (found in /proc/self/status)
  85. * SSB mitigation is enabled and active: NO
  86. > STATUS: VULNERABLE (your CPU and kernel both support SSBD but the mitigation is not active)
  87.  
  88. CVE-2018-3615 aka 'Foreshadow (SGX), L1 terminal fault'
  89. * CPU microcode mitigates the vulnerability: N/A
  90. > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulnerable)
  91.  
  92. CVE-2018-3620 aka 'Foreshadow-NG (OS), L1 terminal fault'
  93. * Mitigated according to the /sys interface: YES (Mitigation: PTE Inversion; VMX: vulnerable, SMT disabled)
  94. * Kernel supports PTE inversion: YES (found in kernel image)
  95. * PTE inversion enabled and active: YES
  96. > STATUS: NOT VULNERABLE (Mitigation: PTE Inversion; VMX: vulnerable, SMT disabled)
  97.  
  98. CVE-2018-3646 aka 'Foreshadow-NG (VMM), L1 terminal fault'
  99. * Information from the /sys interface: Mitigation: PTE Inversion; VMX: vulnerable, SMT disabled
  100. * This system is a host running a hypervisor: NO
  101. * Mitigation 1 (KVM)
  102. * EPT is disabled: NO
  103. * Mitigation 2
  104. * L1D flush is supported by kernel: YES (found flush_l1d in /proc/cpuinfo)
  105. * L1D flush enabled: NO
  106. * Hardware-backed L1D flush supported: YES (performance impact of the mitigation will be greatly reduced)
  107. * Hyper-Threading (SMT) is enabled: NO
  108. > STATUS: NOT VULNERABLE (this system is not running a hypervisor)
  109.  
  110. CVE-2018-12126 aka 'Fallout, microarchitectural store buffer data sampling (MSBDS)'
  111. * Mitigated according to the /sys interface: NO (Vulnerable; SMT disabled)
  112. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  113. * Kernel mitigation is enabled and active: NO
  114. * SMT is either mitigated or disabled: YES
  115. > STATUS: VULNERABLE (Vulnerable; SMT disabled)
  116.  
  117. CVE-2018-12130 aka 'ZombieLoad, microarchitectural fill buffer data sampling (MFBDS)'
  118. * Mitigated according to the /sys interface: NO (Vulnerable; SMT disabled)
  119. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  120. * Kernel mitigation is enabled and active: NO
  121. * SMT is either mitigated or disabled: YES
  122. > STATUS: VULNERABLE (Vulnerable; SMT disabled)
  123.  
  124. CVE-2018-12127 aka 'RIDL, microarchitectural load port data sampling (MLPDS)'
  125. * Mitigated according to the /sys interface: NO (Vulnerable; SMT disabled)
  126. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  127. * Kernel mitigation is enabled and active: NO
  128. * SMT is either mitigated or disabled: YES
  129. > STATUS: VULNERABLE (Vulnerable; SMT disabled)
  130.  
  131. CVE-2019-11091 aka 'RIDL, microarchitectural data sampling uncacheable memory (MDSUM)'
  132. * Mitigated according to the /sys interface: NO (Vulnerable; SMT disabled)
  133. * Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
  134. * Kernel mitigation is enabled and active: NO
  135. * SMT is either mitigated or disabled: YES
  136. > STATUS: VULNERABLE (Vulnerable; SMT disabled)
  137.  
  138. > SUMMARY: CVE-2017-5753:OK CVE-2017-5715:KO CVE-2017-5754:KO CVE-2018-3640:OK CVE-2018-3639:KO CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:KO CVE-2018-12130:KO CVE-2018-12127:KO CVE-2019-11091:KO
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement