We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
looking for linux_proc_banner in /proc/kallsyms protected. requires root
The text was updated successfully, but these errors were encountered:
#19
Sorry, something went wrong.
No branches or pull requests
looking for linux_proc_banner in /proc/kallsyms
protected. requires root
cached = 34, uncached = 208, threshold 84
read ffffffff81a00060 = 25 % (score=995/1000)
read ffffffff81a00061 = 73 s (score=988/1000)
read ffffffff81a00062 = 20 (score=991/1000)
read ffffffff81a00063 = 76 v (score=991/1000)
read ffffffff81a00064 = 65 e (score=989/1000)
read ffffffff81a00065 = 72 r (score=989/1000)
read ffffffff81a00066 = 73 s (score=989/1000)
read ffffffff81a00067 = 69 i (score=991/1000)
read ffffffff81a00068 = 6f o (score=995/1000)
read ffffffff81a00069 = 6e n (score=990/1000)
read ffffffff81a0006a = 20 (score=990/1000)
read ffffffff81a0006b = 25 % (score=990/1000)
read ffffffff81a0006c = 73 s (score=962/1000)
read ffffffff81a0006d = 20 (score=987/1000)
read ffffffff81a0006e = 28 ( (score=988/1000)
read ffffffff81a0006f = 62 b (score=985/1000)
VULNERABLE
PLEASE POST THIS TO Vulnerable CPU/kernels list #19
VULNERABLE ON
4.4.0-104-lowlatency #127~14.04.1-Ubuntu SMP PREEMPT Mon Dec 11 13:51:42 UTC 2017 x86_64
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 42
model name : Intel(R) Core(TM) i5-2400 CPU @ 3.10GHz
stepping : 7
microcode : 0x29
cpu MHz : 3313.488
cache size : 6144 KB
physical id : 0
The text was updated successfully, but these errors were encountered: