paboldin/meltdown-exploit

Issue 19

ishamfazal opened this issue · 2 comments

VULNERABLE ON
4.14.0-kali1-amd64 #1 SMP Debian 4.14.2-1kali1 (2017-12-04) unknown
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 58
model name : Intel(R) Core(TM) i5-3210M CPU @ 2.50GHz
stepping : 9
microcode : 0x1b
cpu MHz : 2501.000
cache size : 3072 KB
physical id : 0

meltdown-exploit]# make
cc -O2 -msse2 -c -o meltdown.o meltdown.c
cc meltdown.o -o meltdown
[root@li1605-191 meltdown-exploit]# sh run.sh
looking for linux_proc_banner in /proc/kallsyms
cached = 39, uncached = 345, threshold 116
read ffffffff81c00040 = 25 % (score=128/1000)
read ffffffff81c00041 = 73 s (score=121/1000)
read ffffffff81c00042 = 20 (score=98/1000)
read ffffffff81c00043 = 76 v (score=109/1000)
read ffffffff81c00044 = 65 e (score=136/1000)
read ffffffff81c00045 = 72 r (score=101/1000)
read ffffffff81c00046 = 73 s (score=133/1000)
read ffffffff81c00047 = 69 i (score=89/1000)
read ffffffff81c00048 = 6f o (score=106/1000)
read ffffffff81c00049 = 6e n (score=122/1000)
read ffffffff81c0004a = 20 (score=127/1000)
read ffffffff81c0004b = 25 % (score=117/1000)
read ffffffff81c0004c = 73 s (score=129/1000)
read ffffffff81c0004d = 20 (score=112/1000)
read ffffffff81c0004e = 28 ( (score=119/1000)
read ffffffff81c0004f = 6d m (score=109/1000)
VULNERABLE
PLEASE POST THIS TO #19
VULNERABLE ON
4.9.50-x86_64-linode86 #1 SMP Thu Sep 14 19:28:20 UTC 2017 x86_64
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 79
model name : Intel(R) Xeon(R) CPU E5-2697 v4 @ 2.30GHz
stepping : 1
microcode : 0x1
cpu MHz : 2299.994
cache size : 4096 KB
physical id : 0

don't post here, use issue #19