Keresés

Új hozzászólás Aktív témák

  • Sonja

    nagyúr

    válasz Frawly #57971 üzenetére

    Érdekes, nekem a Spectre2 a VULNERABLE, a Spectre1 és a Meltdown nem. :F

    Spectre and Meltdown mitigation detection tool v0.33+

    Checking for vulnerabilities on current system
    Kernel is Linux 3.13.0-141-lowlatency #190-Ubuntu SMP PREEMPT Fri Jan 19 13:43:10 UTC 2018 x86_64
    CPU is Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz

    Hardware check
    * Hardware support (CPU microcode) for mitigation techniques
    * Indirect Branch Restricted Speculation (IBRS)
    * SPEC_CTRL MSR is available: NO
    * CPU indicates IBRS capability: NO
    * Indirect Branch Prediction Barrier (IBPB)
    * PRED_CMD MSR is available: NO
    * CPU indicates IBPB capability: NO
    * Single Thread Indirect Branch Predictors (STIBP)
    * SPEC_CTRL MSR is available: NO
    * CPU indicates STIBP capability: NO
    * Enhanced IBRS (IBRS_ALL)
    * CPU indicates ARCH_CAPABILITIES MSR availability: NO
    * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
    * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): NO
    * CPU microcode is known to cause stability problems: NO
    * CPU vulnerability to the three speculative execution attacks variants
    * Vulnerable to Variant 1: YES
    * Vulnerable to Variant 2: YES
    * Vulnerable to Variant 3: YES

    CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
    * Kernel has array_index_mask_nospec: NO
    * Checking count of LFENCE opcodes in kernel: YES (99 opcodes found, which is >= 70, heuristic to be improved when official patches become available)
    > STATUS: NOT VULNERABLE (Kernel source has PROBABLY been patched to mitigate the vulnerability (LFENCE opcodes heuristic))

    CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
    * Mitigation 1
    * Kernel is compiled with IBRS/IBPB support: YES
    * Currently enabled features
    * IBRS enabled for Kernel space: NO
    * IBRS enabled for User space: NO
    * IBPB enabled: NO
    * Mitigation 2
    * Kernel compiled with retpoline option: NO
    * Kernel compiled with a retpoline-aware compiler: NO
    * Retpoline enabled: NO
    > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)

    CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
    * Kernel supports Page Table Isolation (PTI): YES
    * PTI enabled and active: YES
    * Running as a Xen PV DomU: NO
    > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)

    A false sense of security is worse than no security at all, see --disclaimer

  • growler

    őstag

    válasz Frawly #57971 üzenetére

    Az innen letölthető 0.32-essel, és a 0.33-assal is teszteltem. [link]
    De mint írtam, nekem régi I3-asom van.

Új hozzászólás Aktív témák