Yes 105 already patched against CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
and not patched CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
So can anyone suggest when planning implement patch for CVE-2017-5715
Hello all, there is already released script for checking Specte and Meltdown vulnerables - see below
https://github.com/speed47/spectre-meltdown-checker
Current kernels 4.4.98-10x patched only for CVE-2017-5754 (Meltdown)
but not for
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'...
Same models and same systems, severs also have same CPU
103 kernel - 32 x Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz (2 Sockets)
102 kernel - 32 x Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz (2 Sockets)
/proc/cpuinfo have differences only for CPU frequency
# diff 102.txt /root/103.txt
8c8
< cpu...
Dell PowerEdge M630
# dmidecode | grep 630
Product Name: PowerEdge M630
SKU Number: SKU=NotProvided;ModelName=PowerEdge M630
at same time same model with kernel 102 have not such problems
# dmidecode | grep 630
Product Name: PowerEdge M630
SKU Number...
Can someone suggest why new 103 kernel (previous one 102 have it) have not KPTI patch:
# uname -a
#1 SMP PVE 4.4.98-103 (Mon, 8 Jan 2018 10:15:44 +0100) x86_64 GNU/Linux
# dmesg | grep "page tables isolation"
# dmesg |grep iso
#
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.