This repository has been archived by the owner on Jul 29, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 8
/
Copy pathspectre-meltdown-checker.yaml
116 lines (116 loc) · 2.77 KB
/
spectre-meltdown-checker.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
globals:
- environments: &environments_arm32
- qemu-armv7
- qemu_arm
- x15
- environments: &environments_i386
- i386
- qemu-i386
- qemu_i386
projects:
- name: LKFT-spectre-meltdown-checker
projects: &projects_all
- lkft/linux-next-master
- lkft/linux-mainline-master
- lkft/linux-stable-rc-linux-6.7.y
- lkft/linux-stable-rc-linux-6.6.y
- lkft/linux-stable-rc-linux-6.5.y
- lkft/linux-stable-rc-linux-6.1.y
- lkft/linux-stable-rc-linux-5.15.y
- lkft/linux-stable-rc-linux-5.10.y
- lkft/linux-stable-rc-linux-5.4.y
- lkft/linux-stable-rc-linux-4.19.y
- lkft/linux-stable-rc-linux-4.14.y
- lkft/linux-stable-rc-linux-4.9.y
- lkft/linux-stable-rc-linux-4.4.y
- lkft/linaro-hikey-stable-rc-4.4-oe
url: https://qa-reports.linaro.org
environments: &environments_all
- bcm2711-rpi-4-b
- bcm2711-rpi-4-b-64k_page_size
- bcm2711-rpi-4-b-clang
- dragonboard-410c
- dragonboard-845c
- e850-96
- fvp-aemva
- fx700
- hi6220-hikey
- i386
- juno-r2
- juno-r2-kasan
- nxp-ls2088
- qemu-arm64
- qemu-armv7
- qemu-i386
- qemu-x86_64
- qemu_arm
- qemu_arm64
- qemu_i386
- qemu_x86_64
- rk3399-rock-pi-4b
- x15
- x86
- x86-kasan
known_issues:
- environments: *environments_i386
notes: >
CVE-2017-5754: VULN PTI is needed to mitigate the vulnerability
CVE-2018-3620: VULN Vulnerable
projects: *projects_all
test_names:
- spectre-meltdown-checker-test/CVE-2017-5754
- spectre-meltdown-checker-test/CVE-2018-3620
url: null
active: true
intermittent: true
- environments:
- i386
- x86
- x86-kasan
notes: >
CVE-2018-3615: VULN your CPU supports SGX and the microcode is not up
to date
projects: *projects_all
test_names:
- spectre-meltdown-checker-test/CVE-2018-3615
url: null
active: true
intermittent: true
- environments:
- fx700
- i386
- juno-r2
- juno-r2-kasan
- nxp-ls2088
- qemu-arm64
- qemu-armv7
- qemu-i386
- qemu-x86_64
- qemu_arm
- qemu_arm64
- qemu_i386
- qemu_x86_64
- x15
- x86
- x86-kasan
notes: >
CVE-2018-3639: VULN Your CPU doesn't support SSBD
CVE-2018-3640: VULN an up-to-date CPU microcode is needed to mitigate
this vulnerability
projects: *projects_all
test_names:
- spectre-meltdown-checker-test/CVE-2018-3639
- spectre-meltdown-checker-test/CVE-2018-3640
url: null
active: true
intermittent: true
- environments:
- x15
notes: >
CVE-2017-5753: VULN (Kernel source needs to be patched to mitigate the vulnerability)
projects: *projects_all
test_names:
- spectre-meltdown-checker-test/CVE-2017-5753
url: null
active: true
intermittent: true