Forum
  1. Forums
  2. CloudLinux and Control Panels
  3. CloudLinux and cPanel
  1. Anonymous User
  2. Monday, February 05, 2018
  3.  Subscribe via email
I have a server running CL6 kernel



2.6.32-896.16.1.lve1.4.51.el6.x86_64 #1 SMP Wed Jan 17 13:19:23 EST 2018 x86_64 x86_64 x86_64 GNU/Linux


I believe in the past this kernel was supposed to not be vulnerable to Spectre Variant 1 however when I run the following checker:

https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh


CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Kernel has array_index_mask_nospec: NO
* Checking count of LFENCE instructions following a jump in kernel: NO (only 23 jump-then-lfence instructions found, should be >= 30 (heuristic))
> STATUS: VULNERABLE (Kernel source needs to be patched to mitigate the vulnerability)


Is this a false alarm or is this kernel vulnerable? I ran a yum update and installed the latest kernel and rebooted.

Best regards,
Eric
Rate this post:
  1. 06.02.2018 16:02:39
  2. # 1
Posts: 136
Joined: 31.01.2017
0
Votes
Undo
Eric,

Please, create a ticket in our helpdesk system at https://cloudlinux.zendesk.com (KernelCare department) so our support team can elaborate on this.
  • Page :
  • 1


There are no replies made for this post yet.
Be one of the first to reply to this post!
Guest
Submit Your Response
Upload files or images for this discussion by clicking on the upload button below. Supports gif,jpg,png,zip,rar,pdf
• Remove Upload Files (Maximum File Size: 2 MB)
You may insert polls into your post. The poll would then appear in the post.
Vote Options
Captcha
To protect the site from bots and unauthorized scripts, we require that you enter the captcha codes below before posting your question.