Skip to content

Instantly share code, notes, and snippets.

@aveao
Created January 14, 2018 16:57
Show Gist options
  • Save aveao/ffd4a549ce54114e3fd37028eead8d57 to your computer and use it in GitHub Desktop.
Save aveao/ffd4a549ce54114e3fd37028eead8d57 to your computer and use it in GitHub Desktop.
Spectre and Meltdown mitigation detection tool v0.30
Checking for vulnerabilities against running kernel Linux 4.14.13-1-ARCH #1 SMP PREEMPT Wed Jan 10 11:14:50 UTC 2018 x86_64
CPU is Intel(R) Core(TM) i5-4210U CPU @ 1.70GHz
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking count of LFENCE opcodes in kernel:  NO 
> STATUS:  VULNERABLE  (only 21 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
* Hardware (CPU microcode) support for mitigation
* The SPEC_CTRL MSR is available:  YES 
* The SPEC_CTRL CPUID feature bit is set:  YES 
* Kernel support for IBRS:  NO 
* IBRS enabled for Kernel space:  NO 
* IBRS enabled for User space:  NO 
* Mitigation 2
* Kernel compiled with retpoline option:  NO 
* Kernel compiled with a retpoline-aware compiler:  NO 
> STATUS:  VULNERABLE  (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Kernel supports Page Table Isolation (PTI):  YES 
* PTI enabled and active:  YES 
> STATUS:  NOT VULNERABLE  (PTI mitigates the vulnerability)
A false sense of security is worse than no security at all, see --disclaimer
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment