-
Notifications
You must be signed in to change notification settings - Fork 270
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable CPU/kernels list #19
Comments
|
|
|
processor : 0 |
processor : 0 |
As expected. Unpatched CentOS ran under Xen hypervisor. 3.10.0-693.11.1.el7.x86_64 #1 SMP Mon Dec 4 23:52:40 UTC 2017 x86_64 processor : 0 |
|
4.13.0-21-generic #24-Ubuntu SMP Mon Dec 18 17:29:16 UTC 2017 x86_64 |
|
VULNERABLE |
VULNERABLE |
|
|
|
|
(inside VM) Problem with strtonum() awk func |
|
|
|
|
|
|
FX-8320E bogus? |
|
|
VULNERABLE ON 4.4.0-98-generic #121-Ubuntu SMP Tue Oct 10 14:24:03 UTC 2017 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 42 model name : Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz stepping : 7 microcode : 0x29 cpu MHz : 3537.058 cache size : 6144 KB physical id : 0 |
VULNERABLE ON |
processor : 0 |
VULNERABLE ON |
|
j@linux:~/meltdown-exploit-master$ ./run.sh |
|
VULNERABLE ON |
|
./run.shlooking for linux_proc_banner in /proc/kallsyms at least i'm not vulnerable to spectre v2 though 👯♀️ |
4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 21:23:04 UTC 2018 x86_64 |
4.12.14-041214-generic #201709200843 SMP Wed Sep 20 12:46:23 UTC 2017 x86_64 |
4.4.0-87-generic #110-Ubuntu SMP Tue Jul 18 12:55:35 UTC 2017 x86_64 |
4.14.62allnoconf #12 SMP PREEMPT Fri Sep 14 20:21:06 EDT 2018 GenuineIntel |
4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) unknown |
Hello. |
|
VULNERABLE ON |
to be fair, i've had to say, that it was tested for research purposes. Mitigations from current linux kernel turned off with the parameters:
|
|
VULNERABLE ON |
processor : 0 |
VULNERABLE ON |
3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 |
VULNERABLE ON |
VULNERABLE ON |
VULNERABLE ON $ cat /sys/devices/system/cpu/vulnerabilities/meltdown |
我已收到您的邮件,并尽快回复您。。
|
It will be hard to merge all the vulnerable CPUs into README.md.
Please, report them here instead.
The text was updated successfully, but these errors were encountered: