mit dem neuesten Update von Kernel 5.10.0-11-amd64 auf Kernel 5.10.0-12-amd64 meckert spectre-meltdown-checker.
Vor dem Update zeigt dieser bzgl. CVE-2017-5715 STATUS: NOT VULNERABLE, nach dem Update STATUS: VULNERABLE.
Das gleiche passiert auch bei Buster nach der Aktualisierung auf Kernel 4.19.0-19-amd64.
Gibt es dafür eine Erklärung?
Code: Alles auswählen
Spectre and Meltdown mitigation detection tool v0.44
Checking for vulnerabilities on current system
Kernel is Linux 5.10.0-11-amd64 #1 SMP Debian 5.10.92-1 (2022-01-18) x86_64
CPU is Intel(R) Core(TM) i7-5820K CPU @ 3.30GHz
...
CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
* Mitigated according to the /sys interface: YES (Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling)
* Mitigation 1
* Kernel is compiled with IBRS support: YES
* IBRS enabled and active: YES (for firmware code only)
* Kernel is compiled with IBPB support: YES
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
* Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
* Kernel supports RSB filling: YES
> STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the vulnerability)
...
Code: Alles auswählen
Spectre and Meltdown mitigation detection tool v0.44
Checking for vulnerabilities on current system
Kernel is Linux 5.10.0-12-amd64 #1 SMP Debian 5.10.103-1 (2022-03-07) x86_64
CPU is Intel(R) Core(TM) i7-5820K CPU @ 3.30GHz
...
CVE-2017-5715 aka 'Spectre Variant 2, branch target injection'
* Mitigated according to the /sys interface: YES (Mitigation: Retpolines, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling)
* Mitigation 1
* Kernel is compiled with IBRS support: YES
* IBRS enabled and active: YES (for firmware code only)
* Kernel is compiled with IBPB support: YES
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
* Kernel supports RSB filling: YES
> STATUS: VULNERABLE (IBRS+IBPB or retpoline+IBPB+RSB filling, is needed to mitigate the vulnerability)
...