meltdown-exploit
meltdown-exploit copied to clipboard
Non-vulnerable CPU/kernels list
Linux kernel version
any
CPU
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 28
model name : Intel(R) Atom(TM) CPU 330 @ 1.60GHz
stepping : 2
microcode : 0x213
cpu MHz : 1600.080
cache size : 512 KB
physical id : 0
Reason
Unaffected because of missing vulnerable branch predictor
Linux kernel version
3.0.8-svn4804 #1 SMP PREEMPT Tue Jan 15 10:12:01 CST 2013 unknown
(Android 4.0.3/32 bit)
CPU
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 39
model name : Intel(R) Atom(TM) CPU Z2460 @ 1.60GHz
stepping : 2
cpu MHz : 600.000
cache size : 512 KB
physical id : 0
siblings : 2
Reason
Unknown, theoretically should be affected according to Intel.
looking for linux_proc_banner in /proc/kallsyms cached = 26, uncached = 343, threshold 94 read ffffffffb3400060 = ff (score=0/1000) read ffffffffb3400061 = ff (score=0/1000) read ffffffffb3400062 = ff (score=0/1000) read ffffffffb3400063 = ff (score=0/1000) read ffffffffb3400064 = ff (score=0/1000) read ffffffffb3400065 = ff (score=0/1000) read ffffffffb3400066 = ff (score=0/1000) read ffffffffb3400067 = ff (score=0/1000) read ffffffffb3400068 = ff (score=0/1000) read ffffffffb3400069 = ff (score=0/1000) read ffffffffb340006a = ff (score=0/1000) read ffffffffb340006b = ff (score=0/1000) read ffffffffb340006c = ff (score=0/1000) read ffffffffb340006d = ff (score=0/1000) read ffffffffb340006e = ff (score=0/1000) read ffffffffb340006f = ff (score=0/1000) NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 142 model name : Intel(R) Core(TM) i7-7600U CPU @ 2.80GHz stepping : 9 microcode : 0x4e cpu MHz : 2911.859 cache size : 4096 KB physical id : 0
NOT VULNERABLE ON 4.14.12-gentoo #1 SMP PREEMPT Mon Jan 8 08:03:27 CET 2018 GenuineIntel processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 78 model name : Intel(R) Core(TM) i5-6200U CPU @ 2.30GHz stepping : 3 microcode : 0xc2 cpu MHz : 2400.000 cache size : 3072 KB physical id : 0
was vulnerable prior to upgrading kernel and cpu microcode (previous microcode version was 0xbe)
NOT VULNERABLE ON
4.9.0-4-grsec-amd64 #1 SMP Debian 4.9.51-1+grsecunoff2 (2017-10-03) unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 54
model name : Intel(R) Atom(TM) CPU D2550 @ 1.86GHz
stepping : 1
microcode : 0x10d
cpu MHz : 1862.159
cache size : 512 KB
physical id : 0
I am unable to know if grsecurity interferes with it. But I doubt so.
NOT VULNERABLE ON 4.14.11-1-ARCH #1 SMP PREEMPT Wed Jan 3 07:02:42 UTC 2018 unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Pentium(R) Dual CPU T2330 @ 1.60GHz stepping : 13 microcode : 0xa3 cpu MHz : 1067.000 cache size : 1024 KB physical id : 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
NOT VULNERABLE ON 4.14.11-1-ARCH #1 SMP PREEMPT Wed Jan 3 07:02:42 UTC 2018 unknown processor : 0 vendor_id : GenuineIntel cpu family : 15 model : 4 model name : Intel(R) Xeon(TM) CPU 2.80GHz stepping : 3 microcode : 0x5 cpu MHz : 2800.030 cache size : 2048 KB physical id : 0
looking for linux_proc_banner in /proc/kallsyms
NOT VULNERABLE
cached = 34, uncached = 237, threshold 89
read ffffffff9dc00060 = ff (score=0/1000)
read ffffffff9dc00061 = ff (score=0/1000)
read ffffffff9dc00062 = ff (score=0/1000)
read ffffffff9dc00063 = ff (score=0/1000)
read ffffffff9dc00064 = ff (score=0/1000)
read ffffffff9dc00065 = ff (score=0/1000)
read ffffffff9dc00066 = ff (score=0/1000)
read ffffffff9dc00067 = ff (score=0/1000)
read ffffffff9dc00068 = ff (score=0/1000)
read ffffffff9dc00069 = ff (score=0/1000)
read ffffffff9dc0006a = ff (score=0/1000)
read ffffffff9dc0006b = ff (score=0/1000)
read ffffffff9dc0006c = ff (score=0/1000)
read ffffffff9dc0006d = ff (score=0/1000)
read ffffffff9dc0006e = ff (score=0/1000)
read ffffffff9dc0006f = ff (score=0/1000)
PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22
NOT VULNERABLE ON
4.14.12-1-ARCH #1 SMP PREEMPT Fri Jan 5 18:19:34 UTC 2018 unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 42
model name : Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz
stepping : 7
microcode : 0x29
cpu MHz : 3392.012
cache size : 8192 KB
physical id : 0
cached = 109, uncached = 632, threshold 262
read ffffffff81a00060 = ff (score=0/1000)
read ffffffff81a00061 = ff (score=0/1000)
read ffffffff81a00062 = ff (score=0/1000)
read ffffffff81a00063 = ff (score=0/1000)
read ffffffff81a00064 = ff (score=0/1000)
read ffffffff81a00065 = ff (score=0/1000)
read ffffffff81a00066 = ff (score=0/1000)
read ffffffff81a00067 = ff (score=0/1000)
read ffffffff81a00068 = ff (score=0/1000)
read ffffffff81a00069 = ff (score=0/1000)
read ffffffff81a0006a = ff (score=0/1000)
read ffffffff81a0006b = ff (score=0/1000)
read ffffffff81a0006c = ff (score=0/1000)
read ffffffff81a0006d = ff (score=0/1000)
read ffffffff81a0006e = ff (score=0/1000)
read ffffffff81a0006f = ff (score=0/1000)
NOT VULNERABLE
PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22
NOT VULNERABLE ON
4.4.0-104-generic #127-Ubuntu SMP Mon Dec 11 12:16:42 UTC 2017 x86_64
processor : 0
vendor_id : AuthenticAMD
cpu family : 21
model : 48
model name : AMD Athlon(tm) X4 860K Quad Core Processor
stepping : 1
microcode : 0x6003106
cpu MHz : 3693.171
cache size : 2048 KB
physical id : 0
3.14.35-std452-i586 #2 SMP Thu Mar 12 08:25:42 UTC 2015 GenuineIntel
processor : 0
vendor_id : GenuineIntel
cpu family : 15
model : 2
model name : Mobile Intel(R) Celeron(R) CPU 2.00GHz
stepping : 7
cpu MHz : 2000.165
cache size : 256 KB
physical id : 0
NOT VULNERABLE ON
4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 76
model name : Intel(R) Celeron(R) CPU N3150 @ 1.60GHz
stepping : 3
microcode : 0x351
cpu MHz : 1230.566
cache size : 1024 KB
physical id : 0
cached = 101, uncached = 661, threshold 258 read ffffffff81600060 = ff (score=0/1000) read ffffffff81600061 = ff (score=0/1000) read ffffffff81600062 = ff (score=0/1000) read ffffffff81600063 = ff (score=0/1000) read ffffffff81600064 = ff (score=0/1000) read ffffffff81600065 = ff (score=0/1000) read ffffffff81600066 = ff (score=0/1000) read ffffffff81600067 = ff (score=0/1000) read ffffffff81600068 = ff (score=0/1000) read ffffffff81600069 = ff (score=0/1000) read ffffffff8160006a = ff (score=0/1000) read ffffffff8160006b = ff (score=0/1000) read ffffffff8160006c = ff (score=0/1000) read ffffffff8160006d = ff (score=0/1000) read ffffffff8160006e = ff (score=0/1000) read ffffffff8160006f = ff (score=0/1000) NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 3.16.0-4-amd64 #1 SMP Debian 3.16.51-3 (2017-12-13) unknown processor : 0 vendor_id : AuthenticAMD cpu family : 21 model : 2 model name : AMD FX(tm)-6350 Six-Core Processor stepping : 0 microcode : 0x6000822 cpu MHz : 4400.231 cache size : 2048 KB physical id : 0
NOT VULNERABLE ON
4.4.104-39-default #1 SMP Thu Jan 4 08:11:03 UTC 2018 (7db1912) x86_64
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 58
model name : Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
stepping : 9
microcode : 0x1c
cpu MHz : 3890.003
cache size : 8192 KB
physical id : 0
cached = 67, uncached = 279, threshold 136 read ffffffff82600020 = ff (score=0/1000) read ffffffff82600021 = ff (score=0/1000) read ffffffff82600022 = ff (score=0/1000) read ffffffff82600023 = ff (score=0/1000) read ffffffff82600024 = ff (score=0/1000) read ffffffff82600025 = ff (score=0/1000) read ffffffff82600026 = ff (score=0/1000) read ffffffff82600027 = ff (score=0/1000) read ffffffff82600028 = ff (score=0/1000) read ffffffff82600029 = ff (score=0/1000) read ffffffff8260002a = ff (score=0/1000) read ffffffff8260002b = ff (score=0/1000) read ffffffff8260002c = ff (score=0/1000) read ffffffff8260002d = ff (score=0/1000) read ffffffff8260002e = ff (score=0/1000) read ffffffff8260002f = ff (score=0/1000) NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 4.14.11-mod-std-ipv6-64propper #3 SMP Thu Jan 4 14:41:20 CET 2018 unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 42 model name : Intel(R) Core(TM) i3-2130 CPU @ 3.40GHz stepping : 7 microcode : 0x28 cpu MHz : 3392.514 cache size : 3072 KB physical id : 0
NOT VULNERABLE ON 4.9.70 #3 SMP Wed Dec 27 17:19:38 CST 2017 unknown processor : 0 vendor_id : AuthenticAMD cpu family : 21 model : 2 model name : AMD Opteron(tm) Processor 6386 SE stepping : 0 microcode : 0x6000822 cpu MHz : 2800.000 cache size : 2048 KB physical id : 0
NOT VULNERABLE ON 4.4.0-101-generic #124~14.04.1-Ubuntu SMP Fri Nov 10 19:05:36 UTC 2017 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 79 model name : Intel(R) Xeon(R) CPU E5-2683 v4 @ 2.10GHz stepping : 1 microcode : 0xb000025 cpu MHz : 2100.060 cache size : 40960 KB physical id : 0
NOT VULNERABLE ON 4.14.12-1-ARCH #1 SMP PREEMPT Fri Jan 5 18:19:34 UTC 2018 unknown processor : 0 vendor_id : AuthenticAMD cpu family : 23 model : 1 model name : AMD Ryzen 5 1600X Six-Core Processor stepping : 1 microcode : 0x8001126 cpu MHz : 3599.998 cache size : 512 KB physical id : 0
NOT VULNERABLE ON 4.14.9 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 55 model name : Intel(R) Atom(TM) CPU Z3735F @ 1.33GHz stepping : 8 microcode : 0x829 cpu MHz : 1332.800 cache size : 1024 KB physical id : 0
NOT VULNERABLE ON 4.14.12-calculate #1 SMP PREEMPT Fri Jan 5 20:48:26 UTC 2018 AuthenticAMD processor : 0 vendor_id : AuthenticAMD cpu family : 15 model : 107 model name : AMD Athlon(tm) 64 X2 Dual Core Processor 5000+ stepping : 2 cpu MHz : 2600.000 cache size : 512 KB physical id : 0 siblings : 2
NOT VULNERABLE ON
2.6.32-48-pve #1 SMP Fri Dec 23 10:22:54 CET 2016 unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 15
model name : Intel(R) Xeon(R) CPU E5335 @ 2.00GHz
stepping : 7
microcode : 105
cpu MHz : 1999.998
cache size : 4096 KB
physical id : 0
4.14.11-1-ARCH #1 SMP PREEMPT Wed Jan 3 07:02:42 UTC 2018 unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 94
model name : Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz
stepping : 3
microcode : 0xba
cpu MHz : 2600.000
cache size : 6144 KB
physical id : 0```
edit: nvm, PTI on
VULNERABLE ON 3.10.0-327.el7.x86_64 #1 SMP Thu Nov 19 22:10:57 UTC 2015 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 58 model name : Intel(R) Core(TM) i5-3210M CPU @ 2.50GHz stepping : 9 microcode : 0x15 cpu MHz : 2492.668 cache size : 3072 KB physical id : 0
NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 79 model name : Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz stepping : 1 microcode : 0x1 cpu MHz : 2399.996 cache size : 16384 KB physical id : 0
looking for linux_proc_banner in /proc/kallsyms
cached = 36, uncached = 322, threshold 107
read ffffffff98c00060 = ff (score=0/1000)
read ffffffff98c00061 = ff (score=0/1000)
read ffffffff98c00062 = ff (score=0/1000)
read ffffffff98c00063 = ff (score=0/1000)
read ffffffff98c00064 = ff (score=0/1000)
read ffffffff98c00065 = ff (score=0/1000)
read ffffffff98c00066 = ff (score=0/1000)
read ffffffff98c00067 = ff (score=0/1000)
read ffffffff98c00068 = ff (score=0/1000)
read ffffffff98c00069 = ff (score=0/1000)
read ffffffff98c0006a = ff (score=0/1000)
read ffffffff98c0006b = ff (score=0/1000)
read ffffffff98c0006c = ff (score=0/1000)
read ffffffff98c0006d = ff (score=0/1000)
read ffffffff98c0006e = ff (score=0/1000)
read ffffffff98c0006f = ff (score=0/1000)
NOT VULNERABLE
PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22
NOT VULNERABLE ON
4.14.11-3-MANJARO #1 SMP PREEMPT Thu Jan 4 13:28:20 UTC 2018 unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 30
model name : Intel(R) Core(TM) i5 CPU 760 @ 2.80GHz
stepping : 5
microcode : 0x7
cpu MHz : 1199.000
cache size : 8192 KB
physical id : 0
NOT VULNERABLE ON 4.4.104-18.44-default #1 SMP Thu Jan 4 08:07:55 UTC 2018 (05a9de6) x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 60 model name : Intel(R) Core(TM) i7-4600M CPU @ 2.90GHz stepping : 3 microcode : 0x22 cpu MHz : 3499.990 cache size : 4096 KB physical id : 0
NOT VULNERABLE ON 4.4.0-62-generic #83-Ubuntu SMP Wed Jan 18 14:10:15 UTC 2017 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 77 model name : Intel(R) Atom(TM) CPU C2538 @ 2.40GHz stepping : 8 microcode : 0x1 cpu MHz : 2399.998 cache size : 1024 KB physical id : 0
confusing result: tested on Synology NAS 1815+ in Virtual Machine; concerning Synology not yet patched and vulnerable https://www.synology.com/en-us/support/security/Synology_SA_18_01
NOT VULNERABLE ON 4.14.12-1-ARCH #1 SMP PREEMPT Fri Jan 5 18:19:34 UTC 2018 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Core(TM) i5 CPU M 540 @ 2.53GHz stepping : 5 microcode : 0x3 cpu MHz : 1199.000 cache size : 3072 KB physical id : 0
NOT VULNERABLE ON 4.10.0-33-generic #37~16.04.1-Ubuntu SMP Fri Aug 11 14:07:24 UTC 2017 x86_64 processor : 0 vendor_id : AuthenticAMD cpu family : 21 model : 2 model name : AMD FX(tm)-6300 Six-Core Processor stepping : 0 microcode : 0x6000817 cpu MHz : 1400.000 cache size : 2048 KB physical id : 0
4.13.6-gentoo-gnu #1 SMP Mon Oct 23 18:41:44 CEST 2017 GenuineIntel
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 23
model name : Intel(R) Core(TM)2 CPU P8600 @ 2.40GHz
stepping : 10
cpu MHz : 2400.044
cache size : 3072 KB
physical id : 0
siblings : 2
NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 4.8.0-56-generic #61~16.04.1-Ubuntu SMP Wed Jun 14 11:58:22 UTC 2017 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 28 model name : Intel(R) Atom(TM) CPU 330 @ 1.60GHz stepping : 2 microcode : 0x219 cpu MHz : 1599.908 cache size : 512 KB physical id : 0
NOT VULNERABLE ON 4.14.0-16-generic #19-Ubuntu SMP Mon Jan 8 17:50:31 UTC 2018 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 69 model name : Intel(R) Core(TM) i5-4200U CPU @ 1.60GHz stepping : 1 microcode : 0x21 cpu MHz : 2294.825 cache size : 3072 KB physical id : 0
NOT VULNERABLE PLEASE POST THIS TO https://github.com/paboldin/meltdown-exploit/issues/22 NOT VULNERABLE ON 4.4.0-108-generic #131-Ubuntu SMP Sun Jan 7 14:34:49 UTC 2018 x86_64 processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 26 model name : Intel Core i7 9xx (Nehalem Class Core i7) stepping : 3 microcode : 0x1 cpu MHz : 2260.976 cache size : 4096 KB physical id : 0
I have a false negative result: It says that "not vulnerable", but it must be. NOT VULNERABLE ON 3.10.10-std-def-alt1 #1 SMP Thu Aug 29 20:33:36 UTC 2013 unknown processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 15 model name : Intel(R) Core(TM)2 CPU 6400 @ 2.13GHz stepping : 2 cpu MHz : 2128.000 cache size : 2048 KB physical id : 0 siblings : 2