MERCURY127
Platinum Member | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору M:\>type shout Spectre and Meltdown mitigation detection tool v0.31 Checking for vulnerabilities against running kernel Linux 3.14.56 #1 SMP PREEMPT Wed Nov 4 15:19:30 GMT-8 2015 i686 CPU is Pentium III (Coppermine) Will use vmlinux image vmlinuz Will use kconfig /proc/config.gz Will use no System.map file (accuracy might be reduced) We're missing some kernel info (see -v), accuracy might be reduced CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' * Checking count of LFENCE opcodes in kernel: UNKNOWN > STATUS: UNKNOWN (couldn't check (couldn't find your kernel image in /boot, if you used netboot, this is normal)) CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' * Mitigation 1 * Hardware (CPU microcode) support for mitigation * The SPEC_CTRL MSR is available: NO * The SPEC_CTRL CPUID feature bit is set: YES * The kernel has set the spec_ctrl flag in cpuinfo: NO * Kernel support for IBRS: NO * IBRS enabled for Kernel space: NO * IBRS enabled for User space: NO * Mitigation 2 * Kernel compiled with retpoline option: NO * Kernel compiled with a retpoline-aware compiler: UNKNOWN (couldn't find your kernel image or System.map) > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability) CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3' * Kernel supports Page Table Isolation (PTI): NO * PTI enabled and active: NO * Performance impact if PTI is enabled * CPU supports PCID: NO (no security impact but performance will be degraded with PTI) * CPU supports INVPCID: NO (no security impact but performance will be degraded with PTI) * Checking if we're running under Xen PV (64 bits): NO > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability) A false sense of security is worse than no security at all, see --disclaimer |