View previous topic :: View next topic |
Author |
Message |
krumpf Apprentice

Joined: 15 Jul 2018 Posts: 207
|
Posted: Thu Mar 06, 2025 9:52 am Post subject: Spectre checker with kernel 6.12 |
|
|
Hi,
after upgrading to kernel 6.12, I ran app-admin/spectre-meltdown-checker who shows the following fail
Quote: | CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
* Mitigated according to the /sys interface: YES (Mitigation: Retpolines; IBPB: conditional; IBRS_FW; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected)
* Mitigation 1
* Kernel is compiled with IBRS support: YES
* IBRS enabled and active: UNKNOWN
* Kernel is compiled with IBPB support: YES
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: NO
> STATUS: VULNERABLE (IBRS+IBPB or retpoline+IBPB is needed to mitigate the vulnerability) |
According to logs I kept, it was ok with kernels 6.4 & 6.6, the "* Kernel compiled with retpoline option: " was showing YES
All CPU mitigations are activated in kernel config, it's compiled with CONFIG_MITIGATION_RETPOLINE=y so I'm wondering did I miss (or screw up) something in menuconfig ? _________________ Dragon Princess Music Games Heroes and villains |
|
Back to top |
|
 |
krumpf Apprentice

Joined: 15 Jul 2018 Posts: 207
|
|
Back to top |
|
 |
grknight Retired Dev

Joined: 20 Feb 2015 Posts: 2041
|
Posted: Thu Mar 06, 2025 4:28 pm Post subject: |
|
|
You do know that lscpu can be used to display all known vulnerabilities that the booted kernel is aware of. |
|
Back to top |
|
 |
krumpf Apprentice

Joined: 15 Jul 2018 Posts: 207
|
Posted: Thu Mar 06, 2025 6:24 pm Post subject: |
|
|
grknight wrote: | You do know that lscpu can be used to display all known vulnerabilities that the booted kernel is aware of. |
Nope, I didn't know, thanks for telling _________________ Dragon Princess Music Games Heroes and villains |
|
Back to top |
|
 |
|