X-Git-Url: https://gerrit.fd.io/r/gitweb?a=blobdiff_plain;f=docs%2Freport%2Fintroduction%2Fenvironment%2Fsut_meltspec_alt.rst;fp=docs%2Freport%2Fintroduction%2Ftest_environment_sut_meltspec_alt.rst;h=a92bfa2792e830dea79dd6087bc8735e4d72d17c;hb=14fe52e81c59a5a3558f4f587e56b75e388191dc;hp=b087a939006b98be2ffe98e38279b7f625bad024;hpb=c6bfe865e4a62dda2c5e635df53083e909a6558b;p=csit.git diff --git a/docs/report/introduction/test_environment_sut_meltspec_alt.rst b/docs/report/introduction/environment/sut_meltspec_alt.rst similarity index 96% rename from docs/report/introduction/test_environment_sut_meltspec_alt.rst rename to docs/report/introduction/environment/sut_meltspec_alt.rst index b087a93900..a92bfa2792 100644 --- a/docs/report/introduction/test_environment_sut_meltspec_alt.rst +++ b/docs/report/introduction/environment/sut_meltspec_alt.rst @@ -11,7 +11,7 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github Spectre and Meltdown mitigation detection tool v0.45 Checking for vulnerabilities on current system - Kernel is Linux 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:27:25 UTC 2021 aarch64 + Kernel is Linux 5.15.0-46-generic #49-Ubuntu SMP Thu Aug 4 18:08:11 UTC 2022 aarch64 CPU is ARM v8 model 0xd0c Hardware check @@ -34,10 +34,10 @@ made public in 2018. Script is available on `Spectre & Meltdown Checker Github CVE-2017-5753 aka Spectre Variant 1, bounds check bypass * Mitigated according to the /sys interface: YES (Mitigation: __user pointer sanitization) - > STATUS: UNKNOWN (/sys vulnerability interface use forced, but it's not available!) + > STATUS: UNKNOWN (/sys vulnerability interface use forced, but its not available!) CVE-2017-5715 aka Spectre Variant 2, branch target injection - * Mitigated according to the /sys interface: YES (Not affected) + * Mitigated according to the /sys interface: YES (Mitigation: CSV2, BHB) > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not affected) CVE-2017-5754 aka Variant 3, Meltdown, rogue data cache load